Oct 22 10:14:02 vmfsppjb006 rsyslogd[1578]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="1578" x-info="https://www.rsyslog.com"] rsyslogd was HUPed
Oct 22 10:14:02 vmfsppjb006 rhsmd[7768]: In order for Subscription Manager to provide your system with updates, your system must be registered with the Customer Portal. Please enter your Red Hat login to ensure your system is up-to-date.
Oct 22 10:14:02 vmfsppjb006 dnf[7525]: Metadata cache refreshed recently.
Oct 22 10:14:02 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 10:14:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 10:14:37 vmfsppjb006 dbus-daemon[7783]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 10:14:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 10:14:37 vmfsppjb006 setroubleshoot[7783]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 10:14:38 vmfsppjb006 setroubleshoot[7783]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 10:14:38 vmfsppjb006 platform-python[7783]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 10:34:35 vmfsppjb006 python3.6[1575]: 2021-10-22T01:34:35.420740Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 3;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 11:04:16 vmfsppjb006 python3.6[1575]: 2021-10-22T02:04:16.786305Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 11:04:40 vmfsppjb006 python3.6[1575]: 2021-10-22T02:04:40.889163Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 4;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 11:14:03 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 11:14:03 vmfsppjb006 dnf[8429]: Metadata cache refreshed recently.
Oct 22 11:14:03 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 11:14:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:14:37 vmfsppjb006 dbus-daemon[8442]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:14:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:14:38 vmfsppjb006 setroubleshoot[8442]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:14:39 vmfsppjb006 setroubleshoot[8442]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:14:39 vmfsppjb006 platform-python[8442]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.611939Z INFO ExtHandler ExtHandler Fetching new goal state [incarnation 2 (new incarnation)]
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.670540Z INFO ExtHandler ExtHandler Found private key matching thumbprint 2672AD02EA872C045C588ED118631EAB709E6A3B
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.674899Z INFO ExtHandler ExtHandler Fetch goal state completed
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.712580Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState started [Incarnation: 2; Activity Id: f3541e55-dd40-4f74-aa95-699e4ec5cca3; Correlation Id: 92357789-a373-49f4-b085-a47c22c542a6; GS Creation Time: 2021-10-22T02:22:48.489281Z]
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.713173Z INFO ExtHandler ExtHandler No extension/run-time settings settings found for Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.746494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Target handler state: enabled [incarnation 2]
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.746998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] [Enable] current handler state is: enabled
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.747127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Update settings file: 0.settings
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.747360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Requested extension state: enabled
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.747531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Enable extension: [./install.sh enable]
Oct 22 11:22:52 vmfsppjb006 python3.6[1575]: 2021-10-22T02:22:52.747817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.1974.1", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:01.762492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Command: ./install.sh enable
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: [stdout]
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: Checking if system is supported
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: This system is supported
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: Enabling Azure Network Watcher Agent
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: Force kill all NetworkWatcher Agent related processes
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: Linux version 4.18.0-193.47.1.el8_2.x86_64 (mockbuild@x86-vm-07.build.eng.bos.redhat.com) (gcc version 8.3.1 20191121 (Red Hat 8.3.1-5) (GCC)) #1 SMP Thu Mar 4 03:03:32 EST 2021
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: Setting up Red Hat environment for SSL handshakes
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: Starting AzureNetworkWatcherAgent...Started[0]
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: Core limit: 0
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: [stderr]
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    echo "Disabling Azure Network Watcher Agent"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    forceKillOldAgent
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: }
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: uninstall()
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: {
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    echo "Uninstalling Azure Network Watcher Agent"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    forceKillOldAgent
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: }
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: install()
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: {
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    echo "Installing Azure Network Watcher Agent"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    forceKillOldAgent
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    continueOnUpdateFailureConfigured
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    if [ $? -eq 1 ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        if [ $? -eq 1 ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:            echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:            uninstall
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        fi
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    fi
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: }
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: update()
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: {
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    echo "Updating Azure Network Watcher Agent"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    continueOnUpdateFailureConfigured
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    if [ $? -eq 1 ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        if [ $? -eq 1 ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:            echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:            disable
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        fi
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    fi
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    install
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: }
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: enable()
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: {
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    echo "Enabling Azure Network Watcher Agent"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    forceKillOldAgent
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    /etc/init.d/AzureNetworkWatcherAgent start
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # after agent start the process controller forks child process that
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # initializing the environmet writing X.status file in
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # /var/lib/waagent/NWA folder. Unfortunately until environment is received
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # the status file could not be created since environment contains all the
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # informaton about destination folder, seq id etc. If X.status file is not
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # there waagent caused a failure that is shown in UI as deployment problem
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # even though agent is running successfully. In order to avoid the UI
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # failure the simple thing for now is to wait for a bit until fork is done,
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # later when waagent has better logic to handle a status it should be
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    # removed.
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    sleep 7s
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: }
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: GLIBC_MINVERSION="2.11"
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: + GLIBC_MINVERSION=2.11
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: GLIBC_MINVERSION_MAJOR=2
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: + GLIBC_MINVERSION_MAJOR=2
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: GLIBC_MINVERSION_MINOR=11
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: + GLIBC_MINVERSION_MINOR=11
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: is_version_supported()
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: {
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    curversion=$1
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    if [ "$curversion" = "$GLIBC_MINVERSION" ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        return 1
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    fi
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    local hasdot=0
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    local delim=.
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    case $curversion in
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        *$delim*) hasdot=1;;
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        *) hasdot=0;;
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    esac
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:    if [ $hasdot -eq 1 ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        firstval=`echo $curversion | cut -d "." -f 1`
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:            return 1
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:            return 0
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]:        e
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:01.877198Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Target handler state: enabled [incarnation 2]
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:01.877928Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] [Enable] current handler state is: notinstalled
Oct 22 11:23:01 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:01.878618Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Downloading extension package: https://umsavnvq1qj05chmrq30.blob.core.windows.net/125efe24-ee29-a111-0ad6-4cbc493c26f8/125efe24-ee29-a111-0ad6-4cbc493c26f8_9.10.11.17500.zip
Oct 22 11:23:02 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:02.448091Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Unzipping extension package: /var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux__9.10.11.17500.zip
Oct 22 11:23:02 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:02.681956Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Initializing extension Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500
Oct 22 11:23:02 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:02.683020Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Extension has no settings, write empty 0.settings
Oct 22 11:23:02 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:02.683333Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Install extension [bin/time-limit 870 scripts/install.sh >/dev/null]
Oct 22 11:23:02 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:02.683624Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Executing command: /var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500/bin/time-limit 870 scripts/install.sh >/dev/null with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "9.10.11.17500", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:19.464058Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Command: bin/time-limit 870 scripts/install.sh >/dev/null
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: [stdout]
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: [stderr]
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: Verifying...                          ########################################
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: Preparing...                          ########################################
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: Updating / installing...
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: dependency-agent-9.10.11-17500        ########################################
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:19.466360Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Enable extension: [scripts/run_python.sh scripts/enableHandler.py 1>&2]
Oct 22 11:23:19 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:19.466787Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Executing command: /var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500/scripts/run_python.sh scripts/enableHandler.py 1>&2 with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "9.10.11.17500", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 22 11:23:21 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:21.475467Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Command: scripts/run_python.sh scripts/enableHandler.py 1>&2
Oct 22 11:23:21 vmfsppjb006 python3.6[1575]: [stdout]
Oct 22 11:23:21 vmfsppjb006 python3.6[1575]: [stderr]
Oct 22 11:23:21 vmfsppjb006 python3.6[1575]: Microsoft Dependency Agent service started.
Oct 22 11:23:21 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:21.551307Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Target handler state: enabled [incarnation 2]
Oct 22 11:23:21 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:21.551690Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] [Enable] current handler state is: notinstalled
Oct 22 11:23:21 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:21.552043Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Downloading extension package: https://umsah4xwjb01rwnnrw02.blob.core.windows.net/68216624-9f0f-fb7d-0436-37bcbd666b7a/68216624-9f0f-fb7d-0436-37bcbd666b7a_1.13.40.zip
Oct 22 11:23:23 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:23.357434Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Unzipping extension package: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux__1.13.40.zip
Oct 22 11:23:24 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:24.773740Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Initializing extension Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40
Oct 22 11:23:25 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:25.635627Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Update settings file: 0.settings
Oct 22 11:23:25 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:25.636018Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Install extension [omsagent_shim.sh -install]
Oct 22 11:23:25 vmfsppjb006 python3.6[1575]: 2021-10-22T02:23:25.636362Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Executing command: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/omsagent_shim.sh -install with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.13.40", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 22 11:24:07 vmfsppjb006 kernel: bluechannel: loading out-of-tree module taints kernel.
Oct 22 11:24:07 vmfsppjb006 kernel: bluechannel: module license 'Proprietary' taints kernel.
Oct 22 11:24:07 vmfsppjb006 kernel: Disabling lock debugging due to kernel taint
Oct 22 11:24:07 vmfsppjb006 kernel: bluechannel: module verification failed: signature and/or required key missing - tainting kernel
Oct 22 11:24:07 vmfsppjb006 kernel: bluechannel: driver loading ver=9.10.11 rev=17500
Oct 22 11:24:07 vmfsppjb006 kernel: msda: driver loading ver=9.10.11 rev=17500
Oct 22 11:24:07 vmfsppjb006 kernel: msda: ipv6 support is active
Oct 22 11:24:07 vmfsppjb006 kernel: msda: bluechannel_link @00000000b05ad9cf
Oct 22 11:24:07 vmfsppjb006 kernel: msda: bluechannel_broadcast_heartbeat @00000000943a6f97
Oct 22 11:24:07 vmfsppjb006 kernel: sock_create v4 socket
Oct 22 11:24:07 vmfsppjb006 kernel: Supertramp allocated at 00000000f191de7a
Oct 22 11:24:07 vmfsppjb006 kernel: msda: device registered at 10.56
Oct 22 11:24:07 vmfsppjb006 kernel: msda: set_shm_size=0x800000
Oct 22 11:24:07 vmfsppjb006 kernel: msda: attaching hooks
Oct 22 11:24:07 vmfsppjb006 kernel: shm_area: initialized
Oct 22 11:24:07 vmfsppjb006 kernel: msda: invoking bluechannel_link: LINK {handle_bluechannel_event=00000000d27ecbff}
Oct 22 11:24:07 vmfsppjb006 kernel: bluechannel: transition to LINKED
Oct 22 11:24:07 vmfsppjb006 kernel: msda: starting extants
Oct 22 11:24:07 vmfsppjb006 kernel: msda: extants complete
Oct 22 11:24:07 vmfsppjb006 kernel: msda: mmap requested size=8388608 area_size=8388608
Oct 22 11:24:15 vmfsppjb006 kernel: SELinux:  Converting 2412 SID table entries...
Oct 22 11:24:18 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 22 11:24:18 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 22 11:24:18 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 22 11:24:18 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 22 11:24:18 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 22 11:24:18 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 22 11:24:18 vmfsppjb006 dbus-daemon[881]: [system] Reloaded configuration
Oct 22 11:24:35 vmfsppjb006 kernel: SELinux:  Converting 2412 SID table entries...
Oct 22 11:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:24:37 vmfsppjb006 dbus-daemon[9226]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:24:38 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 22 11:24:38 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 22 11:24:38 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 22 11:24:38 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 22 11:24:38 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 22 11:24:38 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 22 11:24:38 vmfsppjb006 dbus-daemon[881]: [system] Reloaded configuration
Oct 22 11:24:38 vmfsppjb006 systemd[1]: Reloading.
Oct 22 11:24:39 vmfsppjb006 systemd[1]: Reloading.
Oct 22 11:24:39 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:24:39 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:24:39 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:24:39 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:24:39 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 22 11:24:39 vmfsppjb006 omiserver[9335]: /opt/omi/bin/omiserver: stopped server
Oct 22 11:24:39 vmfsppjb006 systemd[1]: Stopped OMI CIM Server.
Oct 22 11:24:39 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:24:39 vmfsppjb006 setroubleshoot[9226]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:24:40 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:24:40 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:24:40 vmfsppjb006 setroubleshoot[9226]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:24:40 vmfsppjb006 platform-python[9226]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:24:41 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 22 11:24:41 vmfsppjb006 omiserver[9461]: /opt/omi/bin/omiserver: stopped server
Oct 22 11:24:41 vmfsppjb006 systemd[1]: Stopped OMI CIM Server.
Oct 22 11:24:41 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:24:41 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:24:41 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:24:57 vmfsppjb006 kernel: SELinux:  Converting 2412 SID table entries...
Oct 22 11:25:00 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 22 11:25:00 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 22 11:25:00 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 22 11:25:00 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 22 11:25:00 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 22 11:25:00 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 22 11:25:00 vmfsppjb006 dbus-daemon[881]: [system] Reloaded configuration
Oct 22 11:25:20 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 22 11:25:20 vmfsppjb006 omiserver[9646]: /opt/omi/bin/omiserver: stopped server
Oct 22 11:25:20 vmfsppjb006 systemd[1]: Stopped OMI CIM Server.
Oct 22 11:25:20 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:25:20 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:25:20 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:25:37 vmfsppjb006 kernel: SELinux:  Converting 2414 SID table entries...
Oct 22 11:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:25:37 vmfsppjb006 dbus-daemon[9706]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:25:40 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 22 11:25:40 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 22 11:25:40 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 22 11:25:40 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 22 11:25:40 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 22 11:25:40 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 22 11:25:40 vmfsppjb006 dbus-daemon[881]: [system] Reloaded configuration
Oct 22 11:25:40 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:25:41 vmfsppjb006 setroubleshoot[9706]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:25:41 vmfsppjb006 setroubleshoot[9706]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:25:41 vmfsppjb006 platform-python[9706]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:25:43 vmfsppjb006 su[9840]: (to omsagent) root on none
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Started Session c1 of user omsagent.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Reached target Paths.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Starting D-Bus User Message Bus Socket.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Reached target Timers.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Listening on D-Bus User Message Bus Socket.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Reached target Sockets.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Reached target Basic System.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Reached target Default.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Startup finished in 45ms.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Stopped target Default.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Stopped target Basic System.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Stopped target Paths.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Stopped target Sockets.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Closed D-Bus User Message Bus Socket.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Reached target Shutdown.
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Starting Exit the Session...
Oct 22 11:25:43 vmfsppjb006 systemd[9842]: Stopped target Timers.
Oct 22 11:25:43 vmfsppjb006 su[9873]: (to omsagent) root on none
Oct 22 11:25:43 vmfsppjb006 systemd[1]: user@986.service: Killing process 9875 (systemctl) with signal SIGKILL.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Started Session c2 of user omsagent.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Reached target Paths.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Reached target Timers.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Failed to connect to API bus: Connection refused
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Starting D-Bus User Message Bus Socket.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Listening on D-Bus User Message Bus Socket.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Reached target Sockets.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Reached target Basic System.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Reached target Default.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Started D-Bus User Message Bus.
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Startup finished in 66ms.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:43 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Stopping D-Bus User Message Bus...
Oct 22 11:25:43 vmfsppjb006 systemd[9879]: Stopped target Default.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Stopped D-Bus User Message Bus.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Stopped target Basic System.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Stopped target Paths.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Stopped target Timers.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Stopped target Sockets.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Closed D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Reached target Shutdown.
Oct 22 11:25:44 vmfsppjb006 systemd[9879]: Starting Exit the Session...
Oct 22 11:25:44 vmfsppjb006 su[9911]: (to omsagent) root on none
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Started Session c3 of user omsagent.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: user@986.service: Killing process 9914 (systemctl) with signal SIGKILL.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Reached target Paths.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Starting D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Reached target Timers.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Listening on D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Reached target Sockets.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Reached target Basic System.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Reached target Default.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Started D-Bus User Message Bus.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Startup finished in 59ms.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Stopping D-Bus User Message Bus...
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Stopped target Default.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Stopped D-Bus User Message Bus.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Stopped target Basic System.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Stopped target Sockets.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Stopped target Timers.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Stopped target Paths.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Closed D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Reached target Shutdown.
Oct 22 11:25:44 vmfsppjb006 systemd[9919]: Starting Exit the Session...
Oct 22 11:25:44 vmfsppjb006 su[9950]: (to omsagent) root on none
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Started Session c4 of user omsagent.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: user@986.service: Killing process 9953 (systemctl) with signal SIGKILL.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Reached target Paths.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Starting D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Reached target Timers.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Listening on D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Reached target Sockets.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Reached target Basic System.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Reached target Default.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Started D-Bus User Message Bus.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Startup finished in 56ms.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Stopped target Default.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Stopping D-Bus User Message Bus...
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Stopped D-Bus User Message Bus.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Stopped target Basic System.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Stopped target Sockets.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Stopped target Timers.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Stopped target Paths.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Closed D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Reached target Shutdown.
Oct 22 11:25:44 vmfsppjb006 systemd[9958]: Starting Exit the Session...
Oct 22 11:25:44 vmfsppjb006 su[9989]: (to omsagent) root on none
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Started Session c5 of user omsagent.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: user@986.service: Killing process 9992 (systemctl) with signal SIGKILL.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Reached target Timers.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Failed to connect to API bus: Connection refused
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Starting D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Reached target Paths.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Listening on D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Reached target Sockets.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Reached target Basic System.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Started D-Bus User Message Bus.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Reached target Default.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Startup finished in 53ms.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Stopping D-Bus User Message Bus...
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Stopped target Default.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Stopped D-Bus User Message Bus.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Stopped target Basic System.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Stopped target Paths.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Stopped target Timers.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Stopped target Sockets.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Closed D-Bus User Message Bus Socket.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Reached target Shutdown.
Oct 22 11:25:44 vmfsppjb006 systemd[9997]: Starting Exit the Session...
Oct 22 11:25:44 vmfsppjb006 su[10028]: (to omsagent) root on none
Oct 22 11:25:44 vmfsppjb006 systemd[1]: Started Session c6 of user omsagent.
Oct 22 11:25:44 vmfsppjb006 systemd[1]: user@986.service: Killing process 10031 (systemctl) with signal SIGKILL.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user@986.service: Start request repeated too quickly.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user@986.service: Failed with result 'start-limit-hit'.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Failed to start User Manager for UID 986.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 22 11:25:45 vmfsppjb006 su[10059]: (to omsagent) root on none
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user@986.service: Start request repeated too quickly.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user@986.service: Failed with result 'start-limit-hit'.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Failed to start User Manager for UID 986.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Started Session c7 of user omsagent.
Oct 22 11:25:45 vmfsppjb006 systemd-user-runtime-dir[10063]: Failed to remove runtime directory /run/user/986 (before unmounting): No such file or directory
Oct 22 11:25:45 vmfsppjb006 systemd-user-runtime-dir[10063]: Failed to remove runtime directory /run/user/986 (after unmounting): No such file or directory
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Control process exited, code=exited status=1
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Failed with result 'exit-code'.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 22 11:25:45 vmfsppjb006 su[10102]: (to omsagent) root on none
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user@986.service: Start request repeated too quickly.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user@986.service: Failed with result 'start-limit-hit'.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Failed to start User Manager for UID 986.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Started Session c8 of user omsagent.
Oct 22 11:25:45 vmfsppjb006 systemd-user-runtime-dir[10104]: Failed to remove runtime directory /run/user/986 (before unmounting): No such file or directory
Oct 22 11:25:45 vmfsppjb006 systemd-user-runtime-dir[10104]: Failed to remove runtime directory /run/user/986 (after unmounting): No such file or directory
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Control process exited, code=exited status=1
Oct 22 11:25:45 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Failed with result 'exit-code'.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 22 11:25:45 vmfsppjb006 su[10130]: (to omsagent) root on none
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Started Session c9 of user omsagent.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 22 11:25:45 vmfsppjb006 omiserver[10163]: /opt/omi/bin/omiserver: stopped server
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopped OMI CIM Server.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:25:45 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 22 11:25:45 vmfsppjb006 omiserver[10239]: /opt/omi/bin/omiserver: stopped server
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Stopped OMI CIM Server.
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:25:45 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:25:45 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:25:46 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 22 11:25:46 vmfsppjb006 omiserver[10330]: /opt/omi/bin/omiserver: stopped server
Oct 22 11:25:46 vmfsppjb006 systemd[1]: Stopped OMI CIM Server.
Oct 22 11:25:46 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:25:46 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:25:46 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:25:47 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 22 11:25:47 vmfsppjb006 omiserver[10452]: /opt/omi/bin/omiserver: stopped server
Oct 22 11:25:47 vmfsppjb006 systemd[1]: Stopped OMI CIM Server.
Oct 22 11:25:47 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 22 11:25:47 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 22 11:25:47 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 22 11:26:07 vmfsppjb006 kernel: SELinux:  Converting 2415 SID table entries...
Oct 22 11:26:09 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 22 11:26:09 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 22 11:26:09 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 22 11:26:09 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 22 11:26:09 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 22 11:26:09 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 22 11:26:10 vmfsppjb006 dbus-daemon[881]: [system] Reloaded configuration
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:11.840144Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Command: omsagent_shim.sh -install
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: [stdout]
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: 2021/10/22 11:26:10 [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Install,success,0,Install succeeded
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: [stderr]
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: nux-1.13.40/keys/keyring.gpg' created
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: gpg: directory '/var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/keys/.gnupg' created
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: gpg: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/keys/.gnupg/trustdb.gpg: trustdb created
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: gpg: key 20541A3DDE321294: public key "Microsoft (Release Signing) <dscgpgkey@microsoft.com>" imported
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: gpg: can't connect to the agent: IPC connect call failed
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: gpg: Total number processed: 1
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: gpg:               imported: 1
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:11.843326Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Requested extension state: enabled
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:11.844119Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable extension: [omsagent_shim.sh -enable]
Oct 22 11:26:11 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:11.844501Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Executing command: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/omsagent_shim.sh -enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.13.40", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 22 11:26:14 vmfsppjb006 omsagent[10598]: Generating certificate ...
Oct 22 11:26:14 vmfsppjb006 omsagent[10600]: [INFO] Agent GUID is 88cbbf33-21c6-46d8-954d-610e33615d03
Oct 22 11:26:14 vmfsppjb006 omsagent[10640]: [INFO] Onboarding success
Oct 22 11:26:15 vmfsppjb006 systemd[1]: Stopping System Logging Service...
Oct 22 11:26:15 vmfsppjb006 rsyslogd[1578]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="1578" x-info="https://www.rsyslog.com"] exiting on signal 15.
Oct 22 11:26:15 vmfsppjb006 systemd[1]: Stopped System Logging Service.
Oct 22 11:26:15 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 22 11:26:15 vmfsppjb006 rsyslogd[10721]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="10721" x-info="https://www.rsyslog.com"] start
Oct 22 11:26:15 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 22 11:26:15 vmfsppjb006 rsyslogd[10721]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 22 11:26:15 vmfsppjb006 systemd[1]: Reloading.
Oct 22 11:26:15 vmfsppjb006 systemd[1]: Reloading.
Oct 22 11:26:16 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 22 11:26:17 vmfsppjb006 su[10857]: (to omsagent) root on none
Oct 22 11:26:17 vmfsppjb006 systemd[1]: Started Session c10 of user omsagent.
Oct 22 11:26:17 vmfsppjb006 omsagent[10901]: [INFO] Configured omsconfig
Oct 22 11:26:22 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 22 11:26:23 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 22 11:26:23 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 22 11:26:25 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:25.881005Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Command: omsagent_shim.sh -enable
Oct 22 11:26:25 vmfsppjb006 python3.6[1575]: [stdout]
Oct 22 11:26:25 vmfsppjb006 python3.6[1575]: 2021/10/22 11:26:24 [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable,success,0,Enable succeeded
Oct 22 11:26:25 vmfsppjb006 python3.6[1575]: [stderr]
Oct 22 11:26:25 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:25.883765Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState completed [Incarnation: 2; 213171 ms; Activity Id: f3541e55-dd40-4f74-aa95-699e4ec5cca3; Correlation Id: 92357789-a373-49f4-b085-a47c22c542a6; GS Creation Time: 2021-10-22T02:22:48.489281Z]
Oct 22 11:26:25 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:25.936687Z INFO ExtHandler ExtHandler Extension status: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 22 11:26:25 vmfsppjb006 python3.6[1575]: 2021-10-22T02:26:25.937192Z INFO ExtHandler ExtHandler All extensions in the goal state have reached a terminal state: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 22 11:26:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:26:37 vmfsppjb006 dbus-daemon[11036]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:26:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:26:37 vmfsppjb006 setroubleshoot[11036]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:26:38 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 22 11:26:38 vmfsppjb006 setroubleshoot[11036]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:26:38 vmfsppjb006 platform-python[11036]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:26:39 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 22 11:26:39 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 22 11:27:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:27:37 vmfsppjb006 dbus-daemon[11199]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:27:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:27:37 vmfsppjb006 setroubleshoot[11199]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:27:38 vmfsppjb006 setroubleshoot[11199]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:27:38 vmfsppjb006 platform-python[11199]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:30:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:30:37 vmfsppjb006 dbus-daemon[11378]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:30:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:30:38 vmfsppjb006 setroubleshoot[11378]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:30:38 vmfsppjb006 setroubleshoot[11378]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:30:38 vmfsppjb006 platform-python[11378]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:34:41 vmfsppjb006 python3.6[1575]: 2021-10-22T02:34:41.786136Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 5;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 11:39:01 vmfsppjb006 systemd[1]: Started Session 13 of user omsagent.
Oct 22 11:39:05 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 22 11:39:06 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 22 11:39:06 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 22 11:39:07 vmfsppjb006 systemd[1]: Stopping System Logging Service...
Oct 22 11:39:07 vmfsppjb006 rsyslogd[10721]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="10721" x-info="https://www.rsyslog.com"] exiting on signal 15.
Oct 22 11:39:07 vmfsppjb006 systemd[1]: Stopped System Logging Service.
Oct 22 11:39:07 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 22 11:39:07 vmfsppjb006 rsyslogd[12059]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="12059" x-info="https://www.rsyslog.com"] start
Oct 22 11:39:07 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 22 11:39:07 vmfsppjb006 rsyslogd[12059]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 22 11:39:09 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 22 11:39:10 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 22 11:39:10 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 22 11:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:39:37 vmfsppjb006 dbus-daemon[12311]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:39:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:39:38 vmfsppjb006 setroubleshoot[12311]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:39:38 vmfsppjb006 setroubleshoot[12311]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:39:38 vmfsppjb006 platform-python[12311]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:41:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:41:37 vmfsppjb006 dbus-daemon[12443]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:41:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:41:38 vmfsppjb006 setroubleshoot[12443]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:41:38 vmfsppjb006 setroubleshoot[12443]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:41:38 vmfsppjb006 platform-python[12443]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:51:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:51:37 vmfsppjb006 dbus-daemon[13034]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:51:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:51:38 vmfsppjb006 setroubleshoot[13034]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:51:38 vmfsppjb006 setroubleshoot[13034]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:51:38 vmfsppjb006 platform-python[13034]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:54:01 vmfsppjb006 systemd[1]: Started Session 14 of user omsagent.
Oct 22 11:54:08 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 11:54:08 vmfsppjb006 journal[7254]: Job Arranger Server[7254]: Got signal [signal:15(SIGTERM),sender_pid:13301,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7255]: Job Arranger Server[7255]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7256]: Job Arranger Server[7256]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7257]: Job Arranger Server[7257]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7258]: Job Arranger Server[7258]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7259]: Job Arranger Server[7259]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7260]: Job Arranger Server[7260]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7261]: Job Arranger Server[7261]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7262]: Job Arranger Server[7262]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7263]: Job Arranger Server[7263]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7264]: Job Arranger Server[7264]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7265]: Job Arranger Server[7265]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:08 vmfsppjb006 journal[7266]: Job Arranger Server[7266]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 11:54:10 vmfsppjb006 journal[7254]: Job Arranger Server[7254]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 11:54:10 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 11:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:54:37 vmfsppjb006 dbus-daemon[13336]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:54:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:54:38 vmfsppjb006 setroubleshoot[13336]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:54:38 vmfsppjb006 setroubleshoot[13336]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:54:38 vmfsppjb006 platform-python[13336]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:55:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 11:55:37 vmfsppjb006 dbus-daemon[13406]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 11:55:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 11:55:38 vmfsppjb006 setroubleshoot[13406]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 11:55:39 vmfsppjb006 setroubleshoot[13406]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 11:55:39 vmfsppjb006 platform-python[13406]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 11:56:16 vmfsppjb006 journal[6894]: Job Arranger Monitor[6894]: [JAMONITOR200001] In ja_sender() jobnet_id 'JOBNET_1' can not be not loaded on schedule_time '202110221255'. calendar_id: CALENDAR_1, schedule_id: SCHEDULE_1, user_name: Admin
Oct 22 11:56:16 vmfsppjb006 journal[6894]: Job Arranger Monitor[6894]: In ja_sender() cmd: /etc/jobarranger/monitor/jasender_monitor.sh '1' 'CALENDAR_1' 'SCHEDULE_1' 'JOBNET_1' 'Admin' '2021/10/22 12:55' ''
Oct 22 11:58:02 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 11:58:02 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 11:58:02 vmfsppjb006 journal[13569]: Job Arranger Server[13569]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 22 11:58:02 vmfsppjb006 journal[13569]: Job Arranger Server[13569]: [JASERVER000003] server #0 started [main process]
Oct 22 11:58:02 vmfsppjb006 journal[13578]: Job Arranger Server[13578]: [JASERVER000004] server #9 started [job loader #1]
Oct 22 11:58:02 vmfsppjb006 journal[13580]: Job Arranger Server[13580]: [JASERVER000004] server #11 started [message send #1]
Oct 22 11:58:02 vmfsppjb006 journal[13581]: Job Arranger Server[13581]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 22 11:58:02 vmfsppjb006 journal[13579]: Job Arranger Server[13579]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 22 11:58:02 vmfsppjb006 journal[13575]: Job Arranger Server[13575]: [JASERVER000004] server #6 started [job trapper #3]
Oct 22 11:58:02 vmfsppjb006 journal[13571]: Job Arranger Server[13571]: [JASERVER000004] server #2 started [start the job #1]
Oct 22 11:58:02 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 11:58:02 vmfsppjb006 journal[13572]: Job Arranger Server[13572]: [JASERVER000004] server #3 started [check the running job #1]
Oct 22 11:58:02 vmfsppjb006 journal[13573]: Job Arranger Server[13573]: [JASERVER000004] server #4 started [job trapper #1]
Oct 22 11:58:02 vmfsppjb006 journal[13574]: Job Arranger Server[13574]: [JASERVER000004] server #5 started [job trapper #2]
Oct 22 11:58:02 vmfsppjb006 journal[13577]: Job Arranger Server[13577]: [JASERVER000004] server #8 started [job trapper #5]
Oct 22 11:58:02 vmfsppjb006 journal[13570]: Job Arranger Server[13570]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 22 11:58:02 vmfsppjb006 journal[13576]: Job Arranger Server[13576]: [JASERVER000004] server #7 started [job trapper #4]
Oct 22 12:00:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:00:37 vmfsppjb006 dbus-daemon[13754]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:00:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:00:38 vmfsppjb006 setroubleshoot[13754]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:00:39 vmfsppjb006 setroubleshoot[13754]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:00:39 vmfsppjb006 platform-python[13754]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:02:10 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 12:02:10 vmfsppjb006 journal[13569]: Job Arranger Server[13569]: Got signal [signal:15(SIGTERM),sender_pid:13864,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13570]: Job Arranger Server[13570]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13571]: Job Arranger Server[13571]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13572]: Job Arranger Server[13572]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13573]: Job Arranger Server[13573]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13574]: Job Arranger Server[13574]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13575]: Job Arranger Server[13575]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13576]: Job Arranger Server[13576]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13577]: Job Arranger Server[13577]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13578]: Job Arranger Server[13578]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13579]: Job Arranger Server[13579]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13580]: Job Arranger Server[13580]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:10 vmfsppjb006 journal[13581]: Job Arranger Server[13581]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:02:12 vmfsppjb006 journal[13569]: Job Arranger Server[13569]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 12:02:12 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 12:02:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:02:37 vmfsppjb006 dbus-daemon[13897]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:02:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:02:38 vmfsppjb006 setroubleshoot[13897]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:02:39 vmfsppjb006 setroubleshoot[13897]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:02:39 vmfsppjb006 platform-python[13897]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:04:20 vmfsppjb006 python3.6[1575]: 2021-10-22T03:04:20.775822Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 12:04:44 vmfsppjb006 python3.6[1575]: 2021-10-22T03:04:44.923092Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 6;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 12:06:16 vmfsppjb006 journal[6894]: Job Arranger Monitor[6894]: [JAMONITOR200002] In ja_sender() jobnet_id 'JOBNET_1' can not be not run on schedule time '202110221205'. calendar_id: CALENDAR_1, schedule_id: SCHEDULE_1, user_name: Admin
Oct 22 12:06:16 vmfsppjb006 journal[6894]: Job Arranger Monitor[6894]: In ja_sender() cmd: /etc/jobarranger/monitor/jasender_monitor.sh '2' 'CALENDAR_1' 'SCHEDULE_1' 'JOBNET_1' 'Admin' '2021/10/22 12:05' '0'
Oct 22 12:06:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:06:37 vmfsppjb006 dbus-daemon[14138]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:06:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:06:38 vmfsppjb006 setroubleshoot[14138]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:06:39 vmfsppjb006 setroubleshoot[14138]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:06:39 vmfsppjb006 platform-python[14138]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:09:01 vmfsppjb006 systemd[1]: Started Session 15 of user omsagent.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Started Session c11 of user root.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Starting D-Bus User Message Bus Socket.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Reached target Timers.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Reached target Paths.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Listening on D-Bus User Message Bus Socket.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Reached target Sockets.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Reached target Basic System.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Reached target Default.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Startup finished in 60ms.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Stopped target Default.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Stopped target Basic System.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Stopped target Paths.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Stopped target Timers.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Stopped target Sockets.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Closed D-Bus User Message Bus Socket.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Reached target Shutdown.
Oct 22 12:09:12 vmfsppjb006 systemd[14492]: Starting Exit the Session...
Oct 22 12:09:12 vmfsppjb006 systemd[1]: user@0.service: Killing process 14526 (systemctl) with signal SIGKILL.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 12:09:12 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 12:09:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:09:37 vmfsppjb006 dbus-daemon[14559]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:09:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:09:38 vmfsppjb006 setroubleshoot[14559]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:09:39 vmfsppjb006 setroubleshoot[14559]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:09:39 vmfsppjb006 platform-python[14559]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:09:54 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 12:09:54 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 12:09:54 vmfsppjb006 journal[14588]: Job Arranger Server[14588]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 22 12:09:54 vmfsppjb006 journal[14588]: Job Arranger Server[14588]: [JASERVER000003] server #0 started [main process]
Oct 22 12:09:54 vmfsppjb006 journal[14598]: Job Arranger Server[14598]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 22 12:09:54 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 12:09:54 vmfsppjb006 journal[14600]: Job Arranger Server[14600]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 22 12:09:54 vmfsppjb006 journal[14599]: Job Arranger Server[14599]: [JASERVER000004] server #11 started [message send #1]
Oct 22 12:09:54 vmfsppjb006 journal[14595]: Job Arranger Server[14595]: [JASERVER000004] server #7 started [job trapper #4]
Oct 22 12:09:54 vmfsppjb006 journal[14590]: Job Arranger Server[14590]: [JASERVER000004] server #2 started [start the job #1]
Oct 22 12:09:54 vmfsppjb006 journal[14591]: Job Arranger Server[14591]: [JASERVER000004] server #3 started [check the running job #1]
Oct 22 12:09:54 vmfsppjb006 journal[14592]: Job Arranger Server[14592]: [JASERVER000004] server #4 started [job trapper #1]
Oct 22 12:09:54 vmfsppjb006 journal[14593]: Job Arranger Server[14593]: [JASERVER000004] server #5 started [job trapper #2]
Oct 22 12:09:54 vmfsppjb006 journal[14594]: Job Arranger Server[14594]: [JASERVER000004] server #6 started [job trapper #3]
Oct 22 12:09:54 vmfsppjb006 journal[14597]: Job Arranger Server[14597]: [JASERVER000004] server #9 started [job loader #1]
Oct 22 12:09:54 vmfsppjb006 journal[14589]: Job Arranger Server[14589]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 22 12:09:54 vmfsppjb006 journal[14596]: Job Arranger Server[14596]: [JASERVER000004] server #8 started [job trapper #5]
Oct 22 12:10:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:10:37 vmfsppjb006 dbus-daemon[14644]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:10:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:10:38 vmfsppjb006 setroubleshoot[14644]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:10:39 vmfsppjb006 setroubleshoot[14644]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:10:39 vmfsppjb006 platform-python[14644]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:11:21 vmfsppjb006 systemd[1]: Stopping Jobarranger Monitor...
Oct 22 12:11:21 vmfsppjb006 journal[6893]: Job Arranger Monitor[6893]: Got signal [signal:15(SIGTERM),sender_pid:14696,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:11:21 vmfsppjb006 journal[6894]: Job Arranger Monitor[6894]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:11:21 vmfsppjb006 journal[6893]: Job Arranger Monitor[6893]: Job Arranger monitor stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 12:11:21 vmfsppjb006 systemd[1]: Stopped Jobarranger Monitor.
Oct 22 12:11:21 vmfsppjb006 systemd[1]: Starting Jobarranger Monitor...
Oct 22 12:11:21 vmfsppjb006 systemd[1]: jobarg-monitor.service: Can't open PID file /run/jobarranger/jobarg_monitor.pid (yet?) after start: No such file or directory
Oct 22 12:11:21 vmfsppjb006 journal[14700]: Job Arranger Monitor[14700]: Starting Job Arranger monitor. Job Arranger 5.0.1 (revision 7557).
Oct 22 12:11:21 vmfsppjb006 journal[14701]: Job Arranger Monitor[14701]: jobarg_monitor #0 started [monitor]
Oct 22 12:11:21 vmfsppjb006 systemd[1]: Started Jobarranger Monitor.
Oct 22 12:12:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:12:37 vmfsppjb006 dbus-daemon[14779]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:12:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:12:38 vmfsppjb006 setroubleshoot[14779]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:12:39 vmfsppjb006 setroubleshoot[14779]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:12:39 vmfsppjb006 platform-python[14779]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:13:02 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 12:13:02 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 12:13:02 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 12:13:02 vmfsppjb006 systemd[1]: Started Session 17 of user jobuser.
Oct 22 12:13:02 vmfsppjb006 systemd-logind[923]: New session 17 of user jobuser.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Reached target Paths.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Reached target Timers.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Starting D-Bus User Message Bus Socket.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Listening on D-Bus User Message Bus Socket.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Reached target Sockets.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Reached target Basic System.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Reached target Default.
Oct 22 12:13:02 vmfsppjb006 systemd[14814]: Startup finished in 52ms.
Oct 22 12:13:02 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 12:13:04 vmfsppjb006 powershell[14841]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 12:13:04 vmfsppjb006 powershell[14841]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 14841 in AppDomain: None.
Oct 22 12:13:04 vmfsppjb006 powershell[14841]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: e2949e9f-3922-4ec6-b991-06973dad7a48#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:05 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:18 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 3):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 12:13:18 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 3):#012qTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1U
Oct 22 12:13:18 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (3 of 3):#012JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: f83fb3a4-cc06-48a4-b4dd-6afb025ea499#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:13:18 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 70f139bb-77f6-42b9-86d4-348fd9ece9ea#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:13:20 vmfsppjb006 powershell[14841]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9d017831-52df-48cb-948b-6a3790a21002#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e4efb7aa-f9b6-4310-a49a-b48ec414e95a#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:13:20 vmfsppjb006 powershell[14841]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 14841 in AppDomain: None.  Error Message: Operation canceled.
Oct 22 12:13:20 vmfsppjb006 systemd-logind[923]: Session 17 logged out. Waiting for processes to exit.
Oct 22 12:13:20 vmfsppjb006 systemd-logind[923]: Removed session 17.
Oct 22 12:13:20 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:13:20 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Stopped target Default.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Stopped target Basic System.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Stopped target Sockets.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Closed D-Bus User Message Bus Socket.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Stopped target Paths.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Stopped target Timers.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Reached target Shutdown.
Oct 22 12:13:20 vmfsppjb006 systemd[14814]: Starting Exit the Session...
Oct 22 12:13:20 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 12:13:20 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:13:20 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 12:13:20 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 12:13:20 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 12:13:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:13:37 vmfsppjb006 dbus-daemon[14917]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:13:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:13:38 vmfsppjb006 setroubleshoot[14917]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:13:39 vmfsppjb006 setroubleshoot[14917]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:13:39 vmfsppjb006 platform-python[14917]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:14:03 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 12:14:05 vmfsppjb006 dnf[14953]: packages-microsoft-com-prod                      14 kB/s | 3.0 kB     00:00
Oct 22 12:14:05 vmfsppjb006 dnf[14953]: MySQL 8.0 Community Server                      121 kB/s | 2.6 kB     00:00
Oct 22 12:14:05 vmfsppjb006 dnf[14953]: MySQL Connectors Community                       82 kB/s | 2.6 kB     00:00
Oct 22 12:14:05 vmfsppjb006 dnf[14953]: MySQL Tools Community                            76 kB/s | 2.6 kB     00:00
Oct 22 12:14:06 vmfsppjb006 dnf[14953]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.2 kB/s | 2.4 kB     00:00
Oct 22 12:14:07 vmfsppjb006 dnf[14953]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.9 kB/s | 2.8 kB     00:00
Oct 22 12:14:08 vmfsppjb006 dnf[14953]: Microsoft Azure RPMs for RHEL8 Extended Update  3.7 kB/s | 2.1 kB     00:00
Oct 22 12:14:08 vmfsppjb006 dnf[14953]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 22 12:14:08 vmfsppjb006 dnf[14953]: Zabbix Official Repository non-supported - x86_  12 kB/s | 3.0 kB     00:00
Oct 22 12:14:09 vmfsppjb006 dnf[14953]: Metadata cache created.
Oct 22 12:14:09 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 12:15:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:15:37 vmfsppjb006 dbus-daemon[15071]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:15:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:15:38 vmfsppjb006 setroubleshoot[15071]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:15:39 vmfsppjb006 setroubleshoot[15071]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:15:39 vmfsppjb006 platform-python[15071]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:19:53 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 12:19:53 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 12:19:53 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 12:19:53 vmfsppjb006 systemd[1]: Started Session 19 of user jobuser.
Oct 22 12:19:53 vmfsppjb006 systemd-logind[923]: New session 19 of user jobuser.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Reached target Paths.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Starting D-Bus User Message Bus Socket.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Reached target Timers.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Listening on D-Bus User Message Bus Socket.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Reached target Sockets.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Reached target Basic System.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Reached target Default.
Oct 22 12:19:54 vmfsppjb006 systemd[15334]: Startup finished in 44ms.
Oct 22 12:19:54 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 12:19:54 vmfsppjb006 powershell[15360]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 15360 in AppDomain: None.
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 581fe1ca-8b05-48c0-b69b-5a9325f2c371#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:19:55 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:20:08 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 12:20:08 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012XNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWa
Oct 22 12:20:08 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 67939acc-e4a6-485f-87d0-ae8999d59895#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:20:09 vmfsppjb006 powershell[15360]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = aa0bef4b-2cec-4a17-8d35-f125ddc2493a#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 693c6fb0-0009-4eb2-b215-18d1ae0db100#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:20:09 vmfsppjb006 systemd-logind[923]: Session 19 logged out. Waiting for processes to exit.
Oct 22 12:20:09 vmfsppjb006 systemd-logind[923]: Removed session 19.
Oct 22 12:20:09 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:20:09 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Stopped target Default.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Stopped target Basic System.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Stopped target Paths.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Stopped target Sockets.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Closed D-Bus User Message Bus Socket.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Stopped target Timers.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Reached target Shutdown.
Oct 22 12:20:09 vmfsppjb006 systemd[15334]: Starting Exit the Session...
Oct 22 12:20:10 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 12:20:10 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:20:10 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 12:20:10 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 12:20:10 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 12:20:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:20:37 vmfsppjb006 dbus-daemon[15451]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:20:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:20:38 vmfsppjb006 setroubleshoot[15451]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:20:39 vmfsppjb006 setroubleshoot[15451]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:20:39 vmfsppjb006 platform-python[15451]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:21:33 vmfsppjb006 journal[14589]: Job Arranger Server[14589]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000130, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 12:21:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:21:37 vmfsppjb006 dbus-daemon[15508]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:21:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:21:37 vmfsppjb006 setroubleshoot[15508]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:21:38 vmfsppjb006 setroubleshoot[15508]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:21:38 vmfsppjb006 platform-python[15508]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:21:57 vmfsppjb006 journal[14589]: Job Arranger Server[14589]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 46, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 12:22:33 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 12:22:33 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 12:22:33 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 12:22:33 vmfsppjb006 systemd[1]: Started Session 21 of user jobuser.
Oct 22 12:22:33 vmfsppjb006 systemd-logind[923]: New session 21 of user jobuser.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Reached target Paths.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Reached target Timers.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Starting D-Bus User Message Bus Socket.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Listening on D-Bus User Message Bus Socket.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Reached target Sockets.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Reached target Basic System.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Reached target Default.
Oct 22 12:22:33 vmfsppjb006 systemd[15588]: Startup finished in 45ms.
Oct 22 12:22:33 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 12:22:33 vmfsppjb006 powershell[15614]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 12:22:33 vmfsppjb006 powershell[15614]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 15614 in AppDomain: None.
Oct 22 12:22:33 vmfsppjb006 powershell[15614]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 12:22:33 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 12:22:33 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 9b8755a7-0a24-4054-afd4-86d99a0cb5cb#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:34 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:22:37 vmfsppjb006 dbus-daemon[15633]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:22:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:22:38 vmfsppjb006 setroubleshoot[15633]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:22:38 vmfsppjb006 setroubleshoot[15633]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:22:38 vmfsppjb006 platform-python[15633]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:22:47 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 12:22:47 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012ckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 685d2bd5-f921-4247-965c-63b383b35537#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:22:47 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 77e240ef-b231-490e-adea-c0ad2f3d1282#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:22:48 vmfsppjb006 powershell[15614]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7a04a14c-4f93-42f3-bbec-fc67015e0391#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = a60d2a33-5dbf-44c6-9037-2bc139fa2437#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:22:49 vmfsppjb006 systemd-logind[923]: Session 21 logged out. Waiting for processes to exit.
Oct 22 12:22:49 vmfsppjb006 systemd-logind[923]: Removed session 21.
Oct 22 12:22:49 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:22:49 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Stopped target Default.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Stopped target Basic System.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Stopped target Timers.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Stopped target Paths.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Stopped target Sockets.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Closed D-Bus User Message Bus Socket.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Reached target Shutdown.
Oct 22 12:22:49 vmfsppjb006 systemd[15588]: Starting Exit the Session...
Oct 22 12:22:49 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 12:22:49 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:22:49 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 12:22:49 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 12:22:49 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 12:23:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:23:37 vmfsppjb006 dbus-daemon[15724]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:23:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:23:37 vmfsppjb006 setroubleshoot[15724]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:23:38 vmfsppjb006 setroubleshoot[15724]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:23:38 vmfsppjb006 platform-python[15724]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:24:01 vmfsppjb006 systemd[1]: Started Session 23 of user omsagent.
Oct 22 12:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:24:37 vmfsppjb006 dbus-daemon[15909]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:24:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:24:37 vmfsppjb006 setroubleshoot[15909]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:24:38 vmfsppjb006 setroubleshoot[15909]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:24:38 vmfsppjb006 platform-python[15909]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:25:37 vmfsppjb006 dbus-daemon[15970]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:25:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:25:37 vmfsppjb006 setroubleshoot[15970]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:25:38 vmfsppjb006 setroubleshoot[15970]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:25:38 vmfsppjb006 platform-python[15970]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:30:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:30:37 vmfsppjb006 dbus-daemon[16284]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:30:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:30:38 vmfsppjb006 setroubleshoot[16284]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:30:38 vmfsppjb006 setroubleshoot[16284]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:30:38 vmfsppjb006 platform-python[16284]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:34:48 vmfsppjb006 python3.6[1575]: 2021-10-22T03:34:48.541678Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 7;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 12:35:21 vmfsppjb006 journal[14589]: Job Arranger Server[14589]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000131, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 12:39:01 vmfsppjb006 systemd[1]: Started Session 24 of user omsagent.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Started Session c12 of user root.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Reached target Paths.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Reached target Timers.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Starting D-Bus User Message Bus Socket.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Listening on D-Bus User Message Bus Socket.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Reached target Sockets.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Reached target Basic System.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Reached target Default.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Startup finished in 48ms.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Stopped target Default.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Stopped target Basic System.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Stopped target Timers.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Stopped target Paths.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Stopped target Sockets.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Closed D-Bus User Message Bus Socket.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Reached target Shutdown.
Oct 22 12:39:14 vmfsppjb006 systemd[16987]: Starting Exit the Session...
Oct 22 12:39:14 vmfsppjb006 systemd[1]: user@0.service: Killing process 17021 (systemctl) with signal SIGKILL.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 12:39:14 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 12:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:39:37 vmfsppjb006 dbus-daemon[17062]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:39:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:39:38 vmfsppjb006 setroubleshoot[17062]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:39:38 vmfsppjb006 setroubleshoot[17062]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:39:38 vmfsppjb006 platform-python[17062]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:43:40 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 12:43:40 vmfsppjb006 journal[14588]: Job Arranger Server[14588]: Got signal [signal:15(SIGTERM),sender_pid:17298,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14589]: Job Arranger Server[14589]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14590]: Job Arranger Server[14590]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14591]: Job Arranger Server[14591]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14592]: Job Arranger Server[14592]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14593]: Job Arranger Server[14593]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14594]: Job Arranger Server[14594]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14595]: Job Arranger Server[14595]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14596]: Job Arranger Server[14596]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14597]: Job Arranger Server[14597]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14598]: Job Arranger Server[14598]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14599]: Job Arranger Server[14599]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:40 vmfsppjb006 journal[14600]: Job Arranger Server[14600]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 12:43:42 vmfsppjb006 journal[14588]: Job Arranger Server[14588]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 12:43:42 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 12:43:42 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 12:43:42 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 12:43:42 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 12:44:25 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 12:44:25 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 12:44:25 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 12:44:25 vmfsppjb006 systemd[1]: Started Session 26 of user jobuser.
Oct 22 12:44:25 vmfsppjb006 systemd-logind[923]: New session 26 of user jobuser.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Starting D-Bus User Message Bus Socket.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Reached target Timers.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Reached target Paths.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Listening on D-Bus User Message Bus Socket.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Reached target Sockets.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Reached target Basic System.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Reached target Default.
Oct 22 12:44:26 vmfsppjb006 systemd[17380]: Startup finished in 45ms.
Oct 22 12:44:26 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 17406 in AppDomain: None.
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: b8d28f5e-021e-4ae2-952d-075bd4491c84#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:26 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:44:37 vmfsppjb006 dbus-daemon[17445]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:44:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:44:38 vmfsppjb006 setroubleshoot[17445]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:44:38 vmfsppjb006 setroubleshoot[17445]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:44:38 vmfsppjb006 platform-python[17445]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:44:40 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 12:44:40 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012GA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: a056171f-de14-49c5-aa2e-4dc6e612d366#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:44:40 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 97e51c78-48e0-4fd1-ae87-4970340c3eb1#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:44:41 vmfsppjb006 powershell[17406]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = cae47a09-6457-436e-b423-cb7d620baf54#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 28667eee-72d6-487a-b276-f1439682042f#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:44:41 vmfsppjb006 systemd-logind[923]: Session 26 logged out. Waiting for processes to exit.
Oct 22 12:44:41 vmfsppjb006 systemd-logind[923]: Removed session 26.
Oct 22 12:44:41 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:44:41 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Stopped target Default.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Stopped target Basic System.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Stopped target Sockets.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Closed D-Bus User Message Bus Socket.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Stopped target Paths.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Stopped target Timers.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Reached target Shutdown.
Oct 22 12:44:41 vmfsppjb006 systemd[17380]: Starting Exit the Session...
Oct 22 12:44:41 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 12:44:41 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:44:41 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 12:44:41 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 12:44:41 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 12:45:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:45:37 vmfsppjb006 dbus-daemon[17528]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:45:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:45:38 vmfsppjb006 setroubleshoot[17528]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:45:38 vmfsppjb006 setroubleshoot[17528]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:45:38 vmfsppjb006 platform-python[17528]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:46:48 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 12:46:50 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 12:46:50 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 12:46:50 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 12:46:50 vmfsppjb006 journal[17618]: Job Arranger Server[17618]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 22 12:46:50 vmfsppjb006 journal[17618]: Job Arranger Server[17618]: [JASERVER000003] server #0 started [main process]
Oct 22 12:46:50 vmfsppjb006 journal[17627]: Job Arranger Server[17627]: [JASERVER000004] server #9 started [job loader #1]
Oct 22 12:46:50 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 12:46:50 vmfsppjb006 journal[17629]: Job Arranger Server[17629]: [JASERVER000004] server #11 started [message send #1]
Oct 22 12:46:50 vmfsppjb006 journal[17630]: Job Arranger Server[17630]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 22 12:46:50 vmfsppjb006 journal[17628]: Job Arranger Server[17628]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 22 12:46:50 vmfsppjb006 journal[17621]: Job Arranger Server[17621]: [JASERVER000004] server #3 started [check the running job #1]
Oct 22 12:46:50 vmfsppjb006 journal[17622]: Job Arranger Server[17622]: [JASERVER000004] server #4 started [job trapper #1]
Oct 22 12:46:50 vmfsppjb006 journal[17619]: Job Arranger Server[17619]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 22 12:46:50 vmfsppjb006 journal[17623]: Job Arranger Server[17623]: [JASERVER000004] server #5 started [job trapper #2]
Oct 22 12:46:50 vmfsppjb006 journal[17624]: Job Arranger Server[17624]: [JASERVER000004] server #6 started [job trapper #3]
Oct 22 12:46:50 vmfsppjb006 journal[17625]: Job Arranger Server[17625]: [JASERVER000004] server #7 started [job trapper #4]
Oct 22 12:46:50 vmfsppjb006 journal[17626]: Job Arranger Server[17626]: [JASERVER000004] server #8 started [job trapper #5]
Oct 22 12:46:50 vmfsppjb006 journal[17620]: Job Arranger Server[17620]: [JASERVER000004] server #2 started [start the job #1]
Oct 22 12:47:12 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 12:47:12 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 12:47:12 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 12:47:12 vmfsppjb006 systemd[1]: Started Session 28 of user jobuser.
Oct 22 12:47:12 vmfsppjb006 systemd-logind[923]: New session 28 of user jobuser.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Starting D-Bus User Message Bus Socket.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Reached target Paths.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Reached target Timers.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Listening on D-Bus User Message Bus Socket.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Reached target Sockets.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Reached target Basic System.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Reached target Default.
Oct 22 12:47:12 vmfsppjb006 systemd[17660]: Startup finished in 50ms.
Oct 22 12:47:12 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 17687 in AppDomain: None.
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 90cd6860-70e7-4d1a-ba62-e0ab575956e0#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:13 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:26 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 12:47:26 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012Gtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 1e34a1a6-ea2e-4073-a2e5-48e9e6306b0a#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:47:26 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: c76ded7a-3e23-4018-8d25-ced6289f3f51#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 12:47:27 vmfsppjb006 powershell[17687]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b806a0e-91a8-4288-9cb7-767375b52eb4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = f85b6a8d-e108-4cb5-9e8b-e55aeda16f31#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 12:47:27 vmfsppjb006 systemd-logind[923]: Session 28 logged out. Waiting for processes to exit.
Oct 22 12:47:27 vmfsppjb006 systemd-logind[923]: Removed session 28.
Oct 22 12:47:27 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:47:27 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Stopped target Default.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Stopped target Basic System.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Stopped target Paths.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Stopped target Timers.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Stopped target Sockets.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Closed D-Bus User Message Bus Socket.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Reached target Shutdown.
Oct 22 12:47:27 vmfsppjb006 systemd[17660]: Starting Exit the Session...
Oct 22 12:47:27 vmfsppjb006 systemd[1]: user@1003.service: Killing process 17725 (systemctl) with signal SIGKILL.
Oct 22 12:47:27 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:47:27 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 12:47:27 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 12:47:27 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 12:47:27 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 12:47:27 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 12:47:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:47:37 vmfsppjb006 dbus-daemon[17752]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:47:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:47:38 vmfsppjb006 setroubleshoot[17752]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:47:38 vmfsppjb006 setroubleshoot[17752]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:47:38 vmfsppjb006 platform-python[17752]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:48:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:48:37 vmfsppjb006 dbus-daemon[17815]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:48:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:48:38 vmfsppjb006 setroubleshoot[17815]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:48:38 vmfsppjb006 setroubleshoot[17815]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:48:38 vmfsppjb006 platform-python[17815]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:53:25 vmfsppjb006 journal[17619]: Job Arranger Server[17619]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000133, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 12:54:01 vmfsppjb006 systemd[1]: Started Session 30 of user omsagent.
Oct 22 12:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:54:37 vmfsppjb006 dbus-daemon[18284]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:54:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:54:38 vmfsppjb006 setroubleshoot[18284]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:54:38 vmfsppjb006 setroubleshoot[18284]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:54:38 vmfsppjb006 platform-python[18284]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 12:55:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 12:55:37 vmfsppjb006 dbus-daemon[18353]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 12:55:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 12:55:38 vmfsppjb006 setroubleshoot[18353]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 12:55:39 vmfsppjb006 setroubleshoot[18353]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 12:55:39 vmfsppjb006 platform-python[18353]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:01:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:01:37 vmfsppjb006 dbus-daemon[18724]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:01:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:01:38 vmfsppjb006 setroubleshoot[18724]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:01:39 vmfsppjb006 setroubleshoot[18724]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:01:39 vmfsppjb006 platform-python[18724]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:04:24 vmfsppjb006 python3.6[1575]: 2021-10-22T04:04:24.539688Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 13:04:48 vmfsppjb006 python3.6[1575]: 2021-10-22T04:04:48.653761Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 8;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 13:09:01 vmfsppjb006 systemd[1]: Started Session 31 of user omsagent.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Started Session c13 of user root.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Reached target Paths.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Starting D-Bus User Message Bus Socket.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Reached target Timers.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Listening on D-Bus User Message Bus Socket.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Reached target Sockets.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Reached target Basic System.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Reached target Default.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Startup finished in 46ms.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Stopped target Default.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Stopped target Basic System.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Stopped target Timers.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Stopped target Paths.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Stopped target Sockets.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Closed D-Bus User Message Bus Socket.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Reached target Shutdown.
Oct 22 13:09:16 vmfsppjb006 systemd[19374]: Starting Exit the Session...
Oct 22 13:09:16 vmfsppjb006 systemd[1]: user@0.service: Killing process 19408 (systemctl) with signal SIGKILL.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 13:09:16 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 13:09:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:09:37 vmfsppjb006 dbus-daemon[19440]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:09:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:09:38 vmfsppjb006 setroubleshoot[19440]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:09:39 vmfsppjb006 setroubleshoot[19440]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:09:39 vmfsppjb006 platform-python[19440]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:10:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:10:37 vmfsppjb006 dbus-daemon[19509]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:10:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:10:38 vmfsppjb006 setroubleshoot[19509]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:10:39 vmfsppjb006 setroubleshoot[19509]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:10:39 vmfsppjb006 platform-python[19509]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:12:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:12:37 vmfsppjb006 dbus-daemon[19631]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:12:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:12:38 vmfsppjb006 setroubleshoot[19631]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:12:39 vmfsppjb006 setroubleshoot[19631]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:12:39 vmfsppjb006 platform-python[19631]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:14:11 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 13:14:11 vmfsppjb006 dnf[19732]: Metadata cache refreshed recently.
Oct 22 13:14:11 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 13:16:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:16:37 vmfsppjb006 dbus-daemon[19883]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:16:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:16:38 vmfsppjb006 setroubleshoot[19883]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:16:39 vmfsppjb006 setroubleshoot[19883]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:16:39 vmfsppjb006 platform-python[19883]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:24:01 vmfsppjb006 systemd[1]: Started Session 33 of user omsagent.
Oct 22 13:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:24:37 vmfsppjb006 dbus-daemon[20466]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:24:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:24:38 vmfsppjb006 setroubleshoot[20466]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:24:39 vmfsppjb006 setroubleshoot[20466]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:24:39 vmfsppjb006 platform-python[20466]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:25:37 vmfsppjb006 dbus-daemon[20535]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:25:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:25:38 vmfsppjb006 setroubleshoot[20535]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:25:39 vmfsppjb006 setroubleshoot[20535]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:25:39 vmfsppjb006 platform-python[20535]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:28:58 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 13:28:58 vmfsppjb006 journal[17618]: Job Arranger Server[17618]: Got signal [signal:15(SIGTERM),sender_pid:20745,sender_uid:0,reason:0]. Exiting ...
Oct 22 13:29:00 vmfsppjb006 journal[17618]: Job Arranger Server[17618]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 13:29:00 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 13:29:00 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 13:29:00 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 13:29:00 vmfsppjb006 journal[20751]: Job Arranger Server[20751]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 22 13:29:00 vmfsppjb006 journal[20751]: Job Arranger Server[20751]: [JASERVER000003] server #0 started [main process]
Oct 22 13:29:00 vmfsppjb006 journal[20761]: Job Arranger Server[20761]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 22 13:29:00 vmfsppjb006 journal[20763]: Job Arranger Server[20763]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 22 13:29:00 vmfsppjb006 journal[20762]: Job Arranger Server[20762]: [JASERVER000004] server #11 started [message send #1]
Oct 22 13:29:00 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 13:29:00 vmfsppjb006 journal[20758]: Job Arranger Server[20758]: [JASERVER000004] server #7 started [job trapper #4]
Oct 22 13:29:00 vmfsppjb006 journal[20754]: Job Arranger Server[20754]: [JASERVER000004] server #3 started [check the running job #1]
Oct 22 13:29:00 vmfsppjb006 journal[20752]: Job Arranger Server[20752]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 22 13:29:00 vmfsppjb006 journal[20753]: Job Arranger Server[20753]: [JASERVER000004] server #2 started [start the job #1]
Oct 22 13:29:00 vmfsppjb006 journal[20755]: Job Arranger Server[20755]: [JASERVER000004] server #4 started [job trapper #1]
Oct 22 13:29:00 vmfsppjb006 journal[20756]: Job Arranger Server[20756]: [JASERVER000004] server #5 started [job trapper #2]
Oct 22 13:29:00 vmfsppjb006 journal[20757]: Job Arranger Server[20757]: [JASERVER000004] server #6 started [job trapper #3]
Oct 22 13:29:00 vmfsppjb006 journal[20760]: Job Arranger Server[20760]: [JASERVER000004] server #9 started [job loader #1]
Oct 22 13:29:00 vmfsppjb006 journal[20759]: Job Arranger Server[20759]: [JASERVER000004] server #8 started [job trapper #5]
Oct 22 13:29:34 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 13:29:34 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 13:29:34 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 13:29:34 vmfsppjb006 systemd[1]: Started Session 34 of user jobuser.
Oct 22 13:29:34 vmfsppjb006 systemd-logind[923]: New session 34 of user jobuser.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Starting D-Bus User Message Bus Socket.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Reached target Paths.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Reached target Timers.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Listening on D-Bus User Message Bus Socket.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Reached target Sockets.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Reached target Basic System.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Reached target Default.
Oct 22 13:29:34 vmfsppjb006 systemd[20811]: Startup finished in 46ms.
Oct 22 13:29:34 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 20837 in AppDomain: None.
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: bc2bf2be-d417-4d8e-9c8e-90a8114656f1#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:35 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:29:37 vmfsppjb006 dbus-daemon[20855]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:29:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:29:39 vmfsppjb006 setroubleshoot[20855]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:29:39 vmfsppjb006 setroubleshoot[20855]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:29:39 vmfsppjb006 platform-python[20855]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:29:47 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 13:29:47 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#01203GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: f428caeb-9b8a-4c94-a121-9a4e0e50531b#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 13:29:48 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: cf4a4525-ddb2-4ee3-ba3e-d8546de3ff5f#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 13:29:49 vmfsppjb006 powershell[20837]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = de6f8486-9722-4ddb-9c8e-73696d52ad94#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 730c8a10-5969-43bc-91c0-5e1aff08e43b#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:29:49 vmfsppjb006 systemd-logind[923]: Session 34 logged out. Waiting for processes to exit.
Oct 22 13:29:49 vmfsppjb006 systemd-logind[923]: Removed session 34.
Oct 22 13:29:49 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:29:49 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Stopped target Default.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Stopped target Basic System.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Stopped target Timers.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Stopped target Sockets.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Closed D-Bus User Message Bus Socket.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Stopped target Paths.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Reached target Shutdown.
Oct 22 13:29:49 vmfsppjb006 systemd[20811]: Starting Exit the Session...
Oct 22 13:29:49 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 13:29:49 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:29:49 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 13:29:49 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 13:29:49 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 13:30:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:30:37 vmfsppjb006 dbus-daemon[20949]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:30:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:30:37 vmfsppjb006 setroubleshoot[20949]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:30:38 vmfsppjb006 setroubleshoot[20949]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:30:38 vmfsppjb006 platform-python[20949]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:31:58 vmfsppjb006 systemd[1]: Started Session 36 of user finsrvpf.
Oct 22 13:31:58 vmfsppjb006 systemd-logind[923]: New session 36 of user finsrvpf.
Oct 22 13:32:07 vmfsppjb006 su[21068]: (to root) finsrvpf on pts/3
Oct 22 13:32:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:32:37 vmfsppjb006 dbus-daemon[21129]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:32:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:32:37 vmfsppjb006 setroubleshoot[21129]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:32:38 vmfsppjb006 setroubleshoot[21129]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:32:38 vmfsppjb006 platform-python[21129]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:33:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:33:37 vmfsppjb006 dbus-daemon[21198]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:33:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:33:37 vmfsppjb006 setroubleshoot[21198]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:33:38 vmfsppjb006 setroubleshoot[21198]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:33:38 vmfsppjb006 platform-python[21198]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:33:43 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 13:33:43 vmfsppjb006 journal[20751]: Job Arranger Server[20751]: Got signal [signal:15(SIGTERM),sender_pid:21215,sender_uid:0,reason:0]. Exiting ...
Oct 22 13:33:45 vmfsppjb006 journal[20751]: Job Arranger Server[20751]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 13:33:45 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 13:33:45 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 13:33:45 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 13:33:45 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 13:34:08 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 13:34:08 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 13:34:08 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 13:34:08 vmfsppjb006 systemd[1]: Started Session 37 of user jobuser.
Oct 22 13:34:08 vmfsppjb006 systemd-logind[923]: New session 37 of user jobuser.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Reached target Paths.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Reached target Timers.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Starting D-Bus User Message Bus Socket.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Listening on D-Bus User Message Bus Socket.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Reached target Sockets.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Reached target Basic System.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Reached target Default.
Oct 22 13:34:08 vmfsppjb006 systemd[21269]: Startup finished in 44ms.
Oct 22 13:34:08 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 13:34:08 vmfsppjb006 powershell[21295]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 13:34:08 vmfsppjb006 powershell[21295]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 21295 in AppDomain: None.
Oct 22 13:34:08 vmfsppjb006 powershell[21295]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 43eb2609-f060-4fc7-a186-34cc13e0ec5a#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:09 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:22 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 13:34:22 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012XYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: dd6366a5-c82c-4337-ab8f-dacd8ad64283#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 13:34:22 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 4589c446-ea6c-4146-9947-02cfde55dda1#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 13:34:23 vmfsppjb006 powershell[21295]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 46fe7373-4334-4eb1-9064-672884982769#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 2653494e-721d-4010-be9e-5e33c3635c29#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:34:23 vmfsppjb006 systemd-logind[923]: Session 37 logged out. Waiting for processes to exit.
Oct 22 13:34:23 vmfsppjb006 systemd-logind[923]: Removed session 37.
Oct 22 13:34:23 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:34:23 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Stopped target Default.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Stopped target Basic System.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Stopped target Paths.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Stopped target Sockets.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Closed D-Bus User Message Bus Socket.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Stopped target Timers.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Reached target Shutdown.
Oct 22 13:34:23 vmfsppjb006 systemd[21269]: Starting Exit the Session...
Oct 22 13:34:24 vmfsppjb006 systemd[1]: user@1003.service: Killing process 21335 (systemctl) with signal SIGKILL.
Oct 22 13:34:24 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:34:24 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 13:34:24 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:34:24 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 13:34:24 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 13:34:24 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 13:34:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:34:37 vmfsppjb006 dbus-daemon[21364]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:34:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:34:37 vmfsppjb006 setroubleshoot[21364]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:34:38 vmfsppjb006 setroubleshoot[21364]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:34:38 vmfsppjb006 platform-python[21364]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:34:51 vmfsppjb006 python3.6[1575]: 2021-10-22T04:34:51.070667Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 9;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 13:35:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:35:37 vmfsppjb006 dbus-daemon[21435]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:35:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:35:38 vmfsppjb006 setroubleshoot[21435]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:35:38 vmfsppjb006 setroubleshoot[21435]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:35:38 vmfsppjb006 platform-python[21435]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:39:01 vmfsppjb006 systemd[1]: Started Session 39 of user omsagent.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Started Session c14 of user root.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Reached target Paths.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Starting D-Bus User Message Bus Socket.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Reached target Timers.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Listening on D-Bus User Message Bus Socket.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Reached target Sockets.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Reached target Basic System.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Reached target Default.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Startup finished in 46ms.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Stopped target Default.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Stopped target Basic System.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Stopped target Sockets.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Closed D-Bus User Message Bus Socket.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Stopped target Timers.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Stopped target Paths.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Reached target Shutdown.
Oct 22 13:39:18 vmfsppjb006 systemd[21834]: Starting Exit the Session...
Oct 22 13:39:18 vmfsppjb006 systemd[1]: user@0.service: Killing process 21868 (systemctl) with signal SIGKILL.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 13:39:18 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 13:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:39:37 vmfsppjb006 dbus-daemon[21908]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:39:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:39:38 vmfsppjb006 setroubleshoot[21908]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:39:38 vmfsppjb006 setroubleshoot[21908]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:39:38 vmfsppjb006 platform-python[21908]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:40:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:40:37 vmfsppjb006 dbus-daemon[21969]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:40:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:40:38 vmfsppjb006 setroubleshoot[21969]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:40:38 vmfsppjb006 setroubleshoot[21969]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:40:38 vmfsppjb006 platform-python[21969]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:44:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:44:37 vmfsppjb006 dbus-daemon[22212]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:44:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:44:38 vmfsppjb006 setroubleshoot[22212]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:44:38 vmfsppjb006 setroubleshoot[22212]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:44:38 vmfsppjb006 platform-python[22212]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:44:54 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 13:44:56 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 13:44:56 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 13:44:56 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 13:44:56 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 13:45:51 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 13:45:53 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 13:45:53 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 13:45:53 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 13:45:53 vmfsppjb006 journal[22329]: Job Arranger Server[22329]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 22 13:45:53 vmfsppjb006 journal[22329]: Job Arranger Server[22329]: [JASERVER000003] server #0 started [main process]
Oct 22 13:45:53 vmfsppjb006 journal[22339]: Job Arranger Server[22339]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 22 13:45:53 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 13:45:53 vmfsppjb006 journal[22341]: Job Arranger Server[22341]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 22 13:45:53 vmfsppjb006 journal[22340]: Job Arranger Server[22340]: [JASERVER000004] server #11 started [message send #1]
Oct 22 13:45:53 vmfsppjb006 journal[22336]: Job Arranger Server[22336]: [JASERVER000004] server #7 started [job trapper #4]
Oct 22 13:45:53 vmfsppjb006 journal[22331]: Job Arranger Server[22331]: [JASERVER000004] server #2 started [start the job #1]
Oct 22 13:45:53 vmfsppjb006 journal[22332]: Job Arranger Server[22332]: [JASERVER000004] server #3 started [check the running job #1]
Oct 22 13:45:53 vmfsppjb006 journal[22333]: Job Arranger Server[22333]: [JASERVER000004] server #4 started [job trapper #1]
Oct 22 13:45:53 vmfsppjb006 journal[22334]: Job Arranger Server[22334]: [JASERVER000004] server #5 started [job trapper #2]
Oct 22 13:45:53 vmfsppjb006 journal[22335]: Job Arranger Server[22335]: [JASERVER000004] server #6 started [job trapper #3]
Oct 22 13:45:53 vmfsppjb006 journal[22338]: Job Arranger Server[22338]: [JASERVER000004] server #9 started [job loader #1]
Oct 22 13:45:53 vmfsppjb006 journal[22330]: Job Arranger Server[22330]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 22 13:45:53 vmfsppjb006 journal[22337]: Job Arranger Server[22337]: [JASERVER000004] server #8 started [job trapper #5]
Oct 22 13:46:10 vmfsppjb006 journal[22330]: Job Arranger Server[22330]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000135, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 13:46:25 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 13:46:25 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 13:46:25 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 13:46:25 vmfsppjb006 systemd[1]: Started Session 41 of user jobuser.
Oct 22 13:46:25 vmfsppjb006 systemd-logind[923]: New session 41 of user jobuser.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Reached target Timers.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Starting D-Bus User Message Bus Socket.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Reached target Paths.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Listening on D-Bus User Message Bus Socket.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Reached target Sockets.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Reached target Basic System.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Reached target Default.
Oct 22 13:46:25 vmfsppjb006 systemd[22380]: Startup finished in 50ms.
Oct 22 13:46:25 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 13:46:25 vmfsppjb006 powershell[22407]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 13:46:25 vmfsppjb006 powershell[22407]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 22407 in AppDomain: None.
Oct 22 13:46:25 vmfsppjb006 powershell[22407]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: db8c7ba3-f8bc-49d0-a257-a27396b9f400#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:26 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:46:37 vmfsppjb006 dbus-daemon[22444]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:46:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:46:38 vmfsppjb006 setroubleshoot[22444]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:46:38 vmfsppjb006 setroubleshoot[22444]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:46:38 vmfsppjb006 platform-python[22444]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:46:38 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 13:46:38 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5Wj
Oct 22 13:46:38 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 2fd4e12e-2a95-4ae6-b876-5b3a1b566294#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 13:46:41 vmfsppjb006 powershell[22407]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 9b495ef4-4b36-4384-ab1c-b4da87d43667#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 0dd37480-c451-40ee-a63f-a091b4014561#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:46:41 vmfsppjb006 systemd-logind[923]: Session 41 logged out. Waiting for processes to exit.
Oct 22 13:46:41 vmfsppjb006 systemd-logind[923]: Removed session 41.
Oct 22 13:46:41 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:46:41 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Stopped target Default.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Stopped target Basic System.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Stopped target Sockets.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Closed D-Bus User Message Bus Socket.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Stopped target Timers.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Stopped target Paths.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Reached target Shutdown.
Oct 22 13:46:41 vmfsppjb006 systemd[22380]: Starting Exit the Session...
Oct 22 13:46:41 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 13:46:41 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:46:41 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 13:46:41 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 13:46:41 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 13:46:45 vmfsppjb006 setroubleshoot[22444]: failed to retrieve rpm info for /run/zabbix/zabbix_server_preprocessing.sock
Oct 22 13:46:45 vmfsppjb006 setroubleshoot[22444]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:46:45 vmfsppjb006 platform-python[22444]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_preprocessing.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:47:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:47:37 vmfsppjb006 dbus-daemon[22544]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:47:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:47:38 vmfsppjb006 setroubleshoot[22544]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:47:38 vmfsppjb006 setroubleshoot[22544]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:47:38 vmfsppjb006 platform-python[22544]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:48:09 vmfsppjb006 journal[22330]: Job Arranger Server[22330]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000136, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 13:49:46 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 13:49:46 vmfsppjb006 journal[22329]: Job Arranger Server[22329]: Got signal [signal:15(SIGTERM),sender_pid:22678,sender_uid:0,reason:0]. Exiting ...
Oct 22 13:49:48 vmfsppjb006 journal[22329]: Job Arranger Server[22329]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 13:49:48 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 13:49:48 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 13:49:48 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 13:49:48 vmfsppjb006 journal[22684]: Job Arranger Server[22684]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 22 13:49:48 vmfsppjb006 journal[22684]: Job Arranger Server[22684]: [JASERVER000003] server #0 started [main process]
Oct 22 13:49:48 vmfsppjb006 journal[22691]: Job Arranger Server[22691]: [JASERVER000004] server #7 started [job trapper #4]
Oct 22 13:49:48 vmfsppjb006 journal[22693]: Job Arranger Server[22693]: [JASERVER000004] server #9 started [job loader #1]
Oct 22 13:49:48 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 13:49:48 vmfsppjb006 journal[22694]: Job Arranger Server[22694]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 22 13:49:48 vmfsppjb006 journal[22695]: Job Arranger Server[22695]: [JASERVER000004] server #11 started [message send #1]
Oct 22 13:49:48 vmfsppjb006 journal[22696]: Job Arranger Server[22696]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 22 13:49:48 vmfsppjb006 journal[22692]: Job Arranger Server[22692]: [JASERVER000004] server #8 started [job trapper #5]
Oct 22 13:49:48 vmfsppjb006 journal[22690]: Job Arranger Server[22690]: [JASERVER000004] server #6 started [job trapper #3]
Oct 22 13:49:48 vmfsppjb006 journal[22685]: Job Arranger Server[22685]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 22 13:49:48 vmfsppjb006 journal[22686]: Job Arranger Server[22686]: [JASERVER000004] server #2 started [start the job #1]
Oct 22 13:49:48 vmfsppjb006 journal[22687]: Job Arranger Server[22687]: [JASERVER000004] server #3 started [check the running job #1]
Oct 22 13:49:48 vmfsppjb006 journal[22688]: Job Arranger Server[22688]: [JASERVER000004] server #4 started [job trapper #1]
Oct 22 13:49:48 vmfsppjb006 journal[22689]: Job Arranger Server[22689]: [JASERVER000004] server #5 started [job trapper #2]
Oct 22 13:50:12 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 13:50:12 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 13:50:12 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 13:50:12 vmfsppjb006 systemd[1]: Started Session 43 of user jobuser.
Oct 22 13:50:12 vmfsppjb006 systemd-logind[923]: New session 43 of user jobuser.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Reached target Paths.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Reached target Timers.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Starting D-Bus User Message Bus Socket.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Listening on D-Bus User Message Bus Socket.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Reached target Sockets.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Reached target Basic System.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Reached target Default.
Oct 22 13:50:12 vmfsppjb006 systemd[22725]: Startup finished in 53ms.
Oct 22 13:50:12 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 13:50:12 vmfsppjb006 powershell[22751]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 13:50:12 vmfsppjb006 powershell[22751]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 22751 in AppDomain: None.
Oct 22 13:50:12 vmfsppjb006 powershell[22751]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: c79676f8-5f15-40ee-aef8-87fd6bd0855a#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:13 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:24 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 13:50:24 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012rdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNA
Oct 22 13:50:24 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 4e8b9844-73f4-4f10-ae9b-c2ed5dc4880a#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 13:50:26 vmfsppjb006 powershell[22751]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ffcef8a5-678a-4c6c-b47d-f6f34af04bf1#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 14e010d7-3fce-45c2-a4bd-99334d02fdec#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 13:50:26 vmfsppjb006 systemd-logind[923]: Session 43 logged out. Waiting for processes to exit.
Oct 22 13:50:26 vmfsppjb006 systemd-logind[923]: Removed session 43.
Oct 22 13:50:26 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:50:26 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Stopped target Default.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Stopped target Basic System.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Stopped target Timers.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Stopped target Paths.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Stopped target Sockets.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Closed D-Bus User Message Bus Socket.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Reached target Shutdown.
Oct 22 13:50:26 vmfsppjb006 systemd[22725]: Starting Exit the Session...
Oct 22 13:50:26 vmfsppjb006 systemd[1]: user@1003.service: Killing process 22789 (systemctl) with signal SIGKILL.
Oct 22 13:50:26 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:50:26 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 13:50:26 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 13:50:26 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 13:50:26 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 13:50:26 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 13:50:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:50:37 vmfsppjb006 dbus-daemon[22826]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:50:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:50:38 vmfsppjb006 setroubleshoot[22826]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:50:38 vmfsppjb006 setroubleshoot[22826]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:50:38 vmfsppjb006 platform-python[22826]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:53:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:53:37 vmfsppjb006 dbus-daemon[23003]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:53:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:53:38 vmfsppjb006 setroubleshoot[23003]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:53:39 vmfsppjb006 setroubleshoot[23003]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:53:39 vmfsppjb006 platform-python[23003]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 13:54:01 vmfsppjb006 systemd[1]: Started Session 45 of user omsagent.
Oct 22 13:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 13:54:37 vmfsppjb006 dbus-daemon[23185]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 13:54:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 13:54:38 vmfsppjb006 setroubleshoot[23185]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 13:54:39 vmfsppjb006 setroubleshoot[23185]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 13:54:39 vmfsppjb006 platform-python[23185]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:00:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:00:37 vmfsppjb006 dbus-daemon[23551]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:00:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:00:38 vmfsppjb006 setroubleshoot[23551]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:00:39 vmfsppjb006 setroubleshoot[23551]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:00:39 vmfsppjb006 platform-python[23551]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:03:42 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:03:42 vmfsppjb006 dbus-daemon[23828]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:03:43 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:03:44 vmfsppjb006 setroubleshoot[23828]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 22 14:03:44 vmfsppjb006 platform-python[23828]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 22 14:04:17 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:04:17 vmfsppjb006 dbus-daemon[23874]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:04:18 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:04:19 vmfsppjb006 setroubleshoot[23874]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 22 14:04:19 vmfsppjb006 platform-python[23874]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 22 14:04:26 vmfsppjb006 python3.6[1575]: 2021-10-22T05:04:26.854614Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 14:04:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:04:37 vmfsppjb006 dbus-daemon[23897]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:04:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:04:38 vmfsppjb006 setroubleshoot[23897]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:04:39 vmfsppjb006 setroubleshoot[23897]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:04:39 vmfsppjb006 platform-python[23897]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:04:57 vmfsppjb006 python3.6[1575]: 2021-10-22T05:04:57.050504Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 10;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 14:09:01 vmfsppjb006 systemd[1]: Started Session 46 of user omsagent.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Started Session c15 of user root.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Reached target Paths.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Starting D-Bus User Message Bus Socket.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Reached target Timers.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Listening on D-Bus User Message Bus Socket.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Reached target Sockets.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Reached target Basic System.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Reached target Default.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Startup finished in 46ms.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Stopped target Default.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Stopped target Basic System.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Stopped target Timers.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Stopped target Sockets.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Closed D-Bus User Message Bus Socket.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Stopped target Paths.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Reached target Shutdown.
Oct 22 14:09:20 vmfsppjb006 systemd[24370]: Starting Exit the Session...
Oct 22 14:09:20 vmfsppjb006 systemd[1]: user@0.service: Killing process 24405 (systemctl) with signal SIGKILL.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 14:09:20 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 14:09:29 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:09:29 vmfsppjb006 dbus-daemon[24424]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:09:29 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:09:30 vmfsppjb006 setroubleshoot[24424]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 22 14:09:30 vmfsppjb006 platform-python[24424]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 22 14:09:37 vmfsppjb006 setroubleshoot[24424]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:09:38 vmfsppjb006 setroubleshoot[24424]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:09:38 vmfsppjb006 platform-python[24424]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:10:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:10:37 vmfsppjb006 dbus-daemon[24507]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:10:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:10:38 vmfsppjb006 setroubleshoot[24507]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:10:39 vmfsppjb006 setroubleshoot[24507]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:10:39 vmfsppjb006 platform-python[24507]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:10:49 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:10:49 vmfsppjb006 dbus-daemon[24517]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:10:50 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:10:51 vmfsppjb006 setroubleshoot[24517]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 22 14:10:51 vmfsppjb006 platform-python[24517]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 22 14:12:59 vmfsppjb006 journal[22685]: Job Arranger Server[22685]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000137, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 14:14:14 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 14:14:14 vmfsppjb006 dnf[24727]: Metadata cache refreshed recently.
Oct 22 14:14:14 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 14:15:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:15:37 vmfsppjb006 dbus-daemon[24814]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:15:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:15:38 vmfsppjb006 setroubleshoot[24814]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:15:39 vmfsppjb006 setroubleshoot[24814]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:15:39 vmfsppjb006 platform-python[24814]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:20:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:20:37 vmfsppjb006 dbus-daemon[25113]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:20:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:20:38 vmfsppjb006 setroubleshoot[25113]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:20:39 vmfsppjb006 setroubleshoot[25113]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:20:39 vmfsppjb006 platform-python[25113]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:24:01 vmfsppjb006 systemd[1]: Started Session 48 of user omsagent.
Oct 22 14:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:24:37 vmfsppjb006 dbus-daemon[25464]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:24:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:24:38 vmfsppjb006 setroubleshoot[25464]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:24:39 vmfsppjb006 setroubleshoot[25464]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:24:39 vmfsppjb006 platform-python[25464]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:25:37 vmfsppjb006 dbus-daemon[25534]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:25:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:25:38 vmfsppjb006 setroubleshoot[25534]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:25:39 vmfsppjb006 setroubleshoot[25534]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:25:39 vmfsppjb006 platform-python[25534]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:34:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:34:37 vmfsppjb006 dbus-daemon[26069]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:34:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:34:37 vmfsppjb006 setroubleshoot[26069]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:34:38 vmfsppjb006 setroubleshoot[26069]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:34:38 vmfsppjb006 platform-python[26069]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:34:59 vmfsppjb006 python3.6[1575]: 2021-10-22T05:34:59.191896Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 11;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 14:39:01 vmfsppjb006 systemd[1]: Started Session 49 of user omsagent.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Started Session c16 of user root.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Reached target Paths.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Starting D-Bus User Message Bus Socket.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Reached target Timers.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Listening on D-Bus User Message Bus Socket.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Reached target Sockets.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Reached target Basic System.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Reached target Default.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Startup finished in 50ms.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Stopped target Default.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Stopped target Basic System.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Stopped target Paths.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Stopped target Sockets.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Closed D-Bus User Message Bus Socket.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Reached target Shutdown.
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Starting Exit the Session...
Oct 22 14:39:22 vmfsppjb006 systemd[26533]: Stopped target Timers.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: user@0.service: Killing process 26567 (systemctl) with signal SIGKILL.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 14:39:22 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 14:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:39:37 vmfsppjb006 dbus-daemon[26598]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:39:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:39:37 vmfsppjb006 setroubleshoot[26598]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:39:38 vmfsppjb006 setroubleshoot[26598]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:39:38 vmfsppjb006 platform-python[26598]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:40:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:40:37 vmfsppjb006 dbus-daemon[26668]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:40:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:40:37 vmfsppjb006 setroubleshoot[26668]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:40:38 vmfsppjb006 setroubleshoot[26668]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:40:38 vmfsppjb006 platform-python[26668]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:45:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:45:37 vmfsppjb006 dbus-daemon[26973]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:45:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:45:38 vmfsppjb006 setroubleshoot[26973]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:45:38 vmfsppjb006 setroubleshoot[26973]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:45:38 vmfsppjb006 platform-python[26973]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:54:01 vmfsppjb006 systemd[1]: Started Session 51 of user omsagent.
Oct 22 14:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:54:37 vmfsppjb006 dbus-daemon[27614]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:54:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:54:38 vmfsppjb006 setroubleshoot[27614]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:54:38 vmfsppjb006 setroubleshoot[27614]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:54:38 vmfsppjb006 platform-python[27614]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 14:55:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 14:55:37 vmfsppjb006 dbus-daemon[27678]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 14:55:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 14:55:38 vmfsppjb006 setroubleshoot[27678]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 14:55:38 vmfsppjb006 setroubleshoot[27678]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 14:55:38 vmfsppjb006 platform-python[27678]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:01:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:01:37 vmfsppjb006 dbus-daemon[28056]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:01:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:01:38 vmfsppjb006 setroubleshoot[28056]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:01:38 vmfsppjb006 setroubleshoot[28056]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:01:38 vmfsppjb006 platform-python[28056]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:04:29 vmfsppjb006 python3.6[1575]: 2021-10-22T06:04:29.027707Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 15:05:05 vmfsppjb006 python3.6[1575]: 2021-10-22T06:05:05.174803Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 12;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 15:09:01 vmfsppjb006 systemd[1]: Started Session 52 of user omsagent.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Started Session c17 of user root.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Starting D-Bus User Message Bus Socket.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Reached target Timers.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Reached target Paths.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Listening on D-Bus User Message Bus Socket.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Reached target Sockets.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Reached target Basic System.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Reached target Default.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Startup finished in 46ms.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Stopped target Default.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Stopped target Basic System.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Stopped target Timers.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Stopped target Sockets.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Closed D-Bus User Message Bus Socket.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Stopped target Paths.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Reached target Shutdown.
Oct 22 15:09:24 vmfsppjb006 systemd[28704]: Starting Exit the Session...
Oct 22 15:09:24 vmfsppjb006 systemd[1]: user@0.service: Killing process 28738 (systemctl) with signal SIGKILL.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 15:09:24 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 15:09:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:09:37 vmfsppjb006 dbus-daemon[28768]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:09:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:09:38 vmfsppjb006 setroubleshoot[28768]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:09:39 vmfsppjb006 setroubleshoot[28768]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:09:39 vmfsppjb006 platform-python[28768]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:14:15 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 15:14:16 vmfsppjb006 dnf[29036]: packages-microsoft-com-prod                      12 kB/s | 3.0 kB     00:00
Oct 22 15:14:16 vmfsppjb006 dnf[29036]: MySQL 8.0 Community Server                       69 kB/s | 2.6 kB     00:00
Oct 22 15:14:16 vmfsppjb006 dnf[29036]: MySQL Connectors Community                       78 kB/s | 2.6 kB     00:00
Oct 22 15:14:16 vmfsppjb006 dnf[29036]: MySQL Tools Community                           124 kB/s | 2.6 kB     00:00
Oct 22 15:14:17 vmfsppjb006 dnf[29036]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.1 kB/s | 2.4 kB     00:00
Oct 22 15:14:18 vmfsppjb006 dnf[29036]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.7 kB/s | 2.8 kB     00:00
Oct 22 15:14:18 vmfsppjb006 dnf[29036]: Microsoft Azure RPMs for RHEL8 Extended Update  6.2 kB/s | 2.1 kB     00:00
Oct 22 15:14:18 vmfsppjb006 dnf[29036]: Zabbix Official Repository - x86_64              13 kB/s | 2.9 kB     00:00
Oct 22 15:14:19 vmfsppjb006 dnf[29036]: Zabbix Official Repository non-supported - x86_  12 kB/s | 3.0 kB     00:00
Oct 22 15:14:20 vmfsppjb006 dnf[29036]: Metadata cache created.
Oct 22 15:14:20 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 15:24:01 vmfsppjb006 systemd[1]: Started Session 54 of user omsagent.
Oct 22 15:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:24:37 vmfsppjb006 dbus-daemon[29764]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:24:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:24:38 vmfsppjb006 setroubleshoot[29764]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:24:39 vmfsppjb006 setroubleshoot[29764]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:24:39 vmfsppjb006 platform-python[29764]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:25:37 vmfsppjb006 dbus-daemon[29832]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:25:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:25:38 vmfsppjb006 setroubleshoot[29832]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:25:39 vmfsppjb006 setroubleshoot[29832]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:25:39 vmfsppjb006 platform-python[29832]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:35:05 vmfsppjb006 python3.6[1575]: 2021-10-22T06:35:05.623828Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 13;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 15:39:01 vmfsppjb006 systemd[1]: Started Session 55 of user omsagent.
Oct 22 15:39:25 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 15:39:25 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 15:39:25 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 15:39:25 vmfsppjb006 systemd[1]: Started Session c18 of user root.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Reached target Paths.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Starting D-Bus User Message Bus Socket.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Reached target Timers.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Listening on D-Bus User Message Bus Socket.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Reached target Sockets.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Reached target Basic System.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Reached target Default.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Startup finished in 46ms.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Stopped target Default.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Stopped target Basic System.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Stopped target Timers.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Stopped target Paths.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Stopped target Sockets.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Closed D-Bus User Message Bus Socket.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Reached target Shutdown.
Oct 22 15:39:26 vmfsppjb006 systemd[30817]: Starting Exit the Session...
Oct 22 15:39:26 vmfsppjb006 systemd[1]: user@0.service: Killing process 30852 (systemctl) with signal SIGKILL.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 15:39:26 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 15:39:26 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 15:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:39:37 vmfsppjb006 dbus-daemon[30883]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:39:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:39:38 vmfsppjb006 setroubleshoot[30883]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:39:39 vmfsppjb006 setroubleshoot[30883]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:39:39 vmfsppjb006 platform-python[30883]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:45:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:45:37 vmfsppjb006 dbus-daemon[31247]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:45:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:45:37 vmfsppjb006 setroubleshoot[31247]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:45:38 vmfsppjb006 setroubleshoot[31247]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:45:38 vmfsppjb006 platform-python[31247]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:54:01 vmfsppjb006 systemd[1]: Started Session 57 of user omsagent.
Oct 22 15:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:54:37 vmfsppjb006 dbus-daemon[31878]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:54:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:54:37 vmfsppjb006 setroubleshoot[31878]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:54:38 vmfsppjb006 setroubleshoot[31878]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:54:38 vmfsppjb006 platform-python[31878]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 15:55:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 15:55:37 vmfsppjb006 dbus-daemon[31946]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 15:55:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 15:55:38 vmfsppjb006 setroubleshoot[31946]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 15:55:38 vmfsppjb006 setroubleshoot[31946]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 15:55:38 vmfsppjb006 platform-python[31946]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:00:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:00:37 vmfsppjb006 dbus-daemon[32263]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:00:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:00:38 vmfsppjb006 setroubleshoot[32263]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:00:38 vmfsppjb006 setroubleshoot[32263]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:00:38 vmfsppjb006 platform-python[32263]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:04:29 vmfsppjb006 python3.6[1575]: 2021-10-22T07:04:29.298052Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 16:05:11 vmfsppjb006 python3.6[1575]: 2021-10-22T07:05:11.465939Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 14;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 16:09:01 vmfsppjb006 systemd[1]: Started Session 58 of user omsagent.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Started Session c19 of user root.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Reached target Timers.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Reached target Paths.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Starting D-Bus User Message Bus Socket.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Listening on D-Bus User Message Bus Socket.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Reached target Sockets.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Reached target Basic System.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Reached target Default.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Startup finished in 48ms.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Stopped target Default.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Stopped target Basic System.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Stopped target Paths.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Stopped target Sockets.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Closed D-Bus User Message Bus Socket.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Reached target Shutdown.
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Starting Exit the Session...
Oct 22 16:09:27 vmfsppjb006 systemd[32984]: Stopped target Timers.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: user@0.service: Killing process 33018 (systemctl) with signal SIGKILL.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 16:09:27 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 16:09:28 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 16:09:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:09:37 vmfsppjb006 dbus-daemon[33038]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:09:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:09:38 vmfsppjb006 setroubleshoot[33038]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:09:38 vmfsppjb006 setroubleshoot[33038]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:09:38 vmfsppjb006 platform-python[33038]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:11:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:11:37 vmfsppjb006 dbus-daemon[33164]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:11:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:11:38 vmfsppjb006 setroubleshoot[33164]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:11:38 vmfsppjb006 setroubleshoot[33164]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:11:38 vmfsppjb006 platform-python[33164]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:14:21 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 16:14:22 vmfsppjb006 dnf[33330]: Metadata cache refreshed recently.
Oct 22 16:14:22 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 16:16:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:16:37 vmfsppjb006 dbus-daemon[33472]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:16:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:16:38 vmfsppjb006 setroubleshoot[33472]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:16:38 vmfsppjb006 setroubleshoot[33472]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:16:39 vmfsppjb006 platform-python[33472]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:24:01 vmfsppjb006 systemd[1]: Started Session 60 of user omsagent.
Oct 22 16:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:24:37 vmfsppjb006 dbus-daemon[34058]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:24:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:24:38 vmfsppjb006 setroubleshoot[34058]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:24:39 vmfsppjb006 setroubleshoot[34058]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:24:39 vmfsppjb006 platform-python[34058]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:25:37 vmfsppjb006 dbus-daemon[34117]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:25:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:25:38 vmfsppjb006 setroubleshoot[34117]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:25:39 vmfsppjb006 setroubleshoot[34117]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:25:39 vmfsppjb006 platform-python[34117]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:35:15 vmfsppjb006 python3.6[1575]: 2021-10-22T07:35:15.513002Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 15;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 16:35:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:35:37 vmfsppjb006 dbus-daemon[34710]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:35:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:35:38 vmfsppjb006 setroubleshoot[34710]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:35:39 vmfsppjb006 setroubleshoot[34710]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:35:39 vmfsppjb006 platform-python[34710]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:39:01 vmfsppjb006 systemd[1]: Started Session 61 of user omsagent.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Started Session c20 of user root.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Starting D-Bus User Message Bus Socket.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Reached target Paths.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Reached target Timers.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Listening on D-Bus User Message Bus Socket.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Reached target Sockets.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Reached target Basic System.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Reached target Default.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Startup finished in 46ms.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Stopped target Default.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Stopped target Basic System.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Stopped target Timers.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Stopped target Paths.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Stopped target Sockets.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Closed D-Bus User Message Bus Socket.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Reached target Shutdown.
Oct 22 16:39:29 vmfsppjb006 systemd[35122]: Starting Exit the Session...
Oct 22 16:39:29 vmfsppjb006 systemd[1]: user@0.service: Killing process 35156 (systemctl) with signal SIGKILL.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 16:39:29 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 16:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:39:37 vmfsppjb006 dbus-daemon[35186]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:39:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:39:38 vmfsppjb006 setroubleshoot[35186]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:39:39 vmfsppjb006 setroubleshoot[35186]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:39:39 vmfsppjb006 platform-python[35186]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:40:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:40:37 vmfsppjb006 dbus-daemon[35256]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:40:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:40:38 vmfsppjb006 setroubleshoot[35256]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:40:39 vmfsppjb006 setroubleshoot[35256]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:40:39 vmfsppjb006 platform-python[35256]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:45:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:45:37 vmfsppjb006 dbus-daemon[35554]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:45:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:45:38 vmfsppjb006 setroubleshoot[35554]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:45:39 vmfsppjb006 setroubleshoot[35554]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:45:39 vmfsppjb006 platform-python[35554]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:49:30 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 16:49:30 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 16:49:30 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 16:49:30 vmfsppjb006 systemd[1]: Started Session 63 of user jobuser.
Oct 22 16:49:30 vmfsppjb006 systemd-logind[923]: New session 63 of user jobuser.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Reached target Paths.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Starting D-Bus User Message Bus Socket.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Reached target Timers.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Listening on D-Bus User Message Bus Socket.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Reached target Sockets.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Reached target Basic System.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Reached target Default.
Oct 22 16:49:30 vmfsppjb006 systemd[35792]: Startup finished in 44ms.
Oct 22 16:49:30 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 35818 in AppDomain: None.
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 14c9bc2b-2189-4380-864d-77bfefcc006f#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:31 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:49:37 vmfsppjb006 dbus-daemon[35843]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:49:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:49:38 vmfsppjb006 setroubleshoot[35843]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:49:39 vmfsppjb006 setroubleshoot[35843]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:49:39 vmfsppjb006 platform-python[35843]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:49:45 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 16:49:45 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012c29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR
Oct 22 16:49:45 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: f03a92f5-4d3b-411c-8ada-a1b6f252946c#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 16:49:47 vmfsppjb006 powershell[35818]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ac5ca163-5bf2-40e6-856d-027e242e819d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = af2bd1db-7818-4ee8-913f-b6436c4fcf32#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 16:49:47 vmfsppjb006 systemd-logind[923]: Session 63 logged out. Waiting for processes to exit.
Oct 22 16:49:47 vmfsppjb006 systemd-logind[923]: Removed session 63.
Oct 22 16:49:47 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 16:49:47 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Stopped target Default.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Stopped target Basic System.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Stopped target Sockets.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Stopped target Timers.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Closed D-Bus User Message Bus Socket.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Stopped target Paths.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Reached target Shutdown.
Oct 22 16:49:47 vmfsppjb006 systemd[35792]: Starting Exit the Session...
Oct 22 16:49:47 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 16:49:47 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 16:49:47 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 16:49:47 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 16:49:47 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 16:49:50 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:49:50 vmfsppjb006 dbus-daemon[35884]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:49:50 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:49:51 vmfsppjb006 setroubleshoot[35884]: failed to retrieve rpm info for /run/zabbix/zabbix_server_preprocessing.sock
Oct 22 16:49:51 vmfsppjb006 setroubleshoot[35884]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:49:51 vmfsppjb006 platform-python[35884]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_preprocessing.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:50:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:50:37 vmfsppjb006 dbus-daemon[35943]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:50:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:50:37 vmfsppjb006 setroubleshoot[35943]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:50:38 vmfsppjb006 setroubleshoot[35943]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:50:38 vmfsppjb006 platform-python[35943]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:51:08 vmfsppjb006 journal[22685]: Job Arranger Server[22685]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000138, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 16:54:01 vmfsppjb006 systemd[1]: Started Session 65 of user omsagent.
Oct 22 16:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:54:37 vmfsppjb006 dbus-daemon[36294]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:54:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:54:37 vmfsppjb006 setroubleshoot[36294]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:54:38 vmfsppjb006 setroubleshoot[36294]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:54:38 vmfsppjb006 platform-python[36294]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 16:55:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 16:55:37 vmfsppjb006 dbus-daemon[36363]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 16:55:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 16:55:37 vmfsppjb006 setroubleshoot[36363]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 16:55:38 vmfsppjb006 setroubleshoot[36363]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 16:55:38 vmfsppjb006 platform-python[36363]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:03:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:03:37 vmfsppjb006 dbus-daemon[36854]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:03:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:03:38 vmfsppjb006 setroubleshoot[36854]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:03:38 vmfsppjb006 setroubleshoot[36854]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:03:38 vmfsppjb006 platform-python[36854]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:04:33 vmfsppjb006 python3.6[1575]: 2021-10-22T08:04:33.274801Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 17:05:21 vmfsppjb006 python3.6[1575]: 2021-10-22T08:05:21.489171Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 16;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 17:06:43 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 17:06:43 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 17:06:43 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 17:06:43 vmfsppjb006 systemd[1]: Started Session 66 of user jobuser.
Oct 22 17:06:43 vmfsppjb006 systemd-logind[923]: New session 66 of user jobuser.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Reached target Paths.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Reached target Timers.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Starting D-Bus User Message Bus Socket.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Listening on D-Bus User Message Bus Socket.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Reached target Sockets.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Reached target Basic System.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Reached target Default.
Oct 22 17:06:43 vmfsppjb006 systemd[37048]: Startup finished in 46ms.
Oct 22 17:06:43 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 17:06:43 vmfsppjb006 powershell[37074]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 17:06:43 vmfsppjb006 powershell[37074]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 37074 in AppDomain: None.
Oct 22 17:06:43 vmfsppjb006 powershell[37074]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 818085fb-2a1a-4801-aecb-83be0526e103#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:44 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:56 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 17:06:56 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012dUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc
Oct 22 17:06:56 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 552d2a40-9a97-4404-83b4-9eb003dfabe5#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 17:06:57 vmfsppjb006 powershell[37074]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e199735a-1fa0-4883-b918-08554d5802e7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = d9df4b12-4f41-4aed-8a87-0ff0d038502d#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:06:57 vmfsppjb006 systemd-logind[923]: Session 66 logged out. Waiting for processes to exit.
Oct 22 17:06:57 vmfsppjb006 systemd-logind[923]: Removed session 66.
Oct 22 17:06:57 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 17:06:57 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Stopped target Default.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Stopped target Basic System.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Stopped target Timers.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Stopped target Sockets.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Closed D-Bus User Message Bus Socket.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Stopped target Paths.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Reached target Shutdown.
Oct 22 17:06:57 vmfsppjb006 systemd[37048]: Starting Exit the Session...
Oct 22 17:06:57 vmfsppjb006 systemd[1]: user@1003.service: Killing process 37110 (systemctl) with signal SIGKILL.
Oct 22 17:06:57 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 17:06:57 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 17:06:57 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 17:06:57 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 17:06:57 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 17:06:57 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 17:07:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:07:37 vmfsppjb006 dbus-daemon[37168]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:07:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:07:38 vmfsppjb006 setroubleshoot[37168]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:07:38 vmfsppjb006 setroubleshoot[37168]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:07:38 vmfsppjb006 platform-python[37168]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:09:01 vmfsppjb006 systemd[1]: Started Session 68 of user omsagent.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Started Session c21 of user root.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Reached target Paths.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Reached target Timers.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Starting D-Bus User Message Bus Socket.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Listening on D-Bus User Message Bus Socket.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Reached target Sockets.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Reached target Basic System.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Reached target Default.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Startup finished in 52ms.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Stopped target Default.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Stopped target Basic System.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Stopped target Sockets.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Closed D-Bus User Message Bus Socket.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Stopped target Paths.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Reached target Shutdown.
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Starting Exit the Session...
Oct 22 17:09:31 vmfsppjb006 systemd[37477]: Stopped target Timers.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: user@0.service: Killing process 37511 (systemctl) with signal SIGKILL.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 17:09:31 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 17:09:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:09:37 vmfsppjb006 dbus-daemon[37527]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:09:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:09:38 vmfsppjb006 setroubleshoot[37527]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:09:38 vmfsppjb006 setroubleshoot[37527]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:09:38 vmfsppjb006 platform-python[37527]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:10:27 vmfsppjb006 systemd[1]: Stopping System Logging Service...
Oct 22 17:10:28 vmfsppjb006 rsyslogd[12059]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="12059" x-info="https://www.rsyslog.com"] exiting on signal 15.
Oct 22 17:10:28 vmfsppjb006 systemd[1]: Stopped System Logging Service.
Oct 22 17:10:28 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 22 17:10:28 vmfsppjb006 rsyslogd[37588]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="37588" x-info="https://www.rsyslog.com"] start
Oct 22 17:10:28 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 22 17:10:28 vmfsppjb006 rsyslogd[37588]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 22 17:10:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:10:37 vmfsppjb006 dbus-daemon[37607]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:10:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:10:38 vmfsppjb006 setroubleshoot[37607]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:10:38 vmfsppjb006 setroubleshoot[37607]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:10:38 vmfsppjb006 platform-python[37607]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:11:01 vmfsppjb006 sshd[37632]: Accepted password for jobuser from 10.30.70.10 port 48028 ssh2
Oct 22 17:11:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 22 17:11:01 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 22 17:11:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 22 17:11:01 vmfsppjb006 systemd[1]: Started Session 70 of user jobuser.
Oct 22 17:11:01 vmfsppjb006 systemd-logind[923]: New session 70 of user jobuser.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: pam_unix(systemd-user:session): session opened for user jobuser by (uid=0)
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Starting D-Bus User Message Bus Socket.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Reached target Timers.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Reached target Paths.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Listening on D-Bus User Message Bus Socket.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Reached target Sockets.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Reached target Basic System.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Reached target Default.
Oct 22 17:11:01 vmfsppjb006 systemd[37637]: Startup finished in 46ms.
Oct 22 17:11:01 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 22 17:11:01 vmfsppjb006 sshd[37632]: pam_unix(sshd:session): session opened for user jobuser by (uid=0)
Oct 22 17:11:01 vmfsppjb006 sudo[37647]: jobuser : TTY=unknown ; PWD=/home/jobuser ; USER=root ; COMMAND=/bin/pwsh /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10
Oct 22 17:11:01 vmfsppjb006 sudo[37647]: pam_systemd(sudo:session): Cannot create session: Already running in a session or user slice
Oct 22 17:11:01 vmfsppjb006 sudo[37647]: pam_unix(sudo:session): session opened for user root by (uid=0)
Oct 22 17:11:01 vmfsppjb006 powershell[37663]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 22 17:11:01 vmfsppjb006 powershell[37663]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 37663 in AppDomain: None.
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 86d4e96d-82b3-4ef9-9ab1-2ec2abb9020d#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: MsalCacheHelperSingleton Error: 0 :
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: [MSAL.Extension][2021-10-22T08:11:02.5245296Z] An error was encountered while saving secret to keyring in the MsalCacheStorage domain:'139' code:'0' message:'Cannot autolaunch D-Bus without X11 $DISPLAY'
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: MsalCacheHelperSingleton Error: 0 :
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: [MSAL.Extension][2021-10-22T08:11:02.5270670Z] An error was encountered while reading secret from keyring in the MsalCacheStorage domain:'139' code:'0' message:'Cannot autolaunch D-Bus without X11 $DISPLAY'
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: MsalCacheHelperSingleton Error: 0 :
Oct 22 17:11:02 vmfsppjb006 powershell[37663]: [MSAL.Extension][2021-10-22T08:11:02.5285242Z] An error was encountered while clearing secret from keyring in the MsalCacheStorage domain:'139' code:'0' message:'Cannot autolaunch D-Bus without X11 $DISPLAY'
Oct 22 17:11:15 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 22 17:11:15 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 3847e6ab-c95b-4754-b521-7f8bb3d540cd#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 17:11:15 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 30d5a535-1775-4593-9753-da952f509479#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 22 17:11:16 vmfsppjb006 powershell[37663]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ab61e0b4-eeb7-44c2-9924-30af280cdb7f#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = e64982c8-c767-4b7b-8a31-e09d9f22e50c#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 22 17:11:16 vmfsppjb006 sudo[37647]: pam_unix(sudo:session): session closed for user root
Oct 22 17:11:16 vmfsppjb006 sshd[37646]: Received disconnect from 10.30.70.10 port 48028:11: Normal Shutdown
Oct 22 17:11:16 vmfsppjb006 sshd[37646]: Disconnected from user jobuser 10.30.70.10 port 48028
Oct 22 17:11:16 vmfsppjb006 sshd[37632]: pam_unix(sshd:session): session closed for user jobuser
Oct 22 17:11:16 vmfsppjb006 systemd-logind[923]: Session 70 logged out. Waiting for processes to exit.
Oct 22 17:11:16 vmfsppjb006 systemd-logind[923]: Removed session 70.
Oct 22 17:11:16 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 17:11:16 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Stopped target Default.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Stopped target Basic System.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Stopped target Paths.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Stopped target Timers.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Stopped target Sockets.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Closed D-Bus User Message Bus Socket.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Reached target Shutdown.
Oct 22 17:11:16 vmfsppjb006 systemd[37637]: Starting Exit the Session...
Oct 22 17:11:16 vmfsppjb006 systemd[37640]: pam_unix(systemd-user:session): session closed for user jobuser
Oct 22 17:11:16 vmfsppjb006 systemd[1]: user@1003.service: Killing process 37705 (systemctl) with signal SIGKILL.
Oct 22 17:11:16 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 17:11:16 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 22 17:11:16 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 22 17:11:16 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 22 17:11:16 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 22 17:11:16 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 22 17:11:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:11:37 vmfsppjb006 dbus-daemon[37745]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:11:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:11:38 vmfsppjb006 setroubleshoot[37745]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:11:38 vmfsppjb006 setroubleshoot[37745]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:11:38 vmfsppjb006 platform-python[37745]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:12:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:12:37 vmfsppjb006 dbus-daemon[37806]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:12:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:12:38 vmfsppjb006 setroubleshoot[37806]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:12:39 vmfsppjb006 setroubleshoot[37806]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:12:39 vmfsppjb006 platform-python[37806]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:14:25 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 17:14:26 vmfsppjb006 dnf[37924]: Metadata cache refreshed recently.
Oct 22 17:14:26 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 17:15:01 vmfsppjb006 CROND[37960]: (root) CMD (/usr/sbin/logrotate -s /var/lib/logrotate/omsagent-status /etc/logrotate.d/omsagent* >/dev/null 2>&1)
Oct 22 17:15:01 vmfsppjb006 CROND[37961]: (root) CMD (/usr/sbin/logrotate /etc/logrotate.d/omi --state /var/opt/omi/log/omi-logrotate.status >/dev/null 2>&1)
Oct 22 17:20:01 vmfsppjb006 CROND[38249]: (root) CMD (/usr/sbin/logrotate -s /var/lib/logrotate/omsagent-status /etc/logrotate.d/omsagent* >/dev/null 2>&1)
Oct 22 17:24:01 vmfsppjb006 systemd[1]: Started Session 72 of user omsagent.
Oct 22 17:24:01 vmfsppjb006 CROND[38478]: (omsagent) CMD (/opt/omi/bin/OMSConsistencyInvoker >/dev/null 2>&1)
Oct 22 17:24:03 vmfsppjb006 sudo[38555]: omsagent : TTY=unknown ; PWD=/opt/microsoft/omsconfig/Scripts/3.x ; USER=root ; COMMAND=/opt/microsoft/omsconfig/Scripts/OMSAuditdPlugin.sh get /var/opt/microsoft/omsagent/cc053e05-5f05-452e-af0d-b80449098844/tmp
Oct 22 17:24:03 vmfsppjb006 sudo[38555]: pam_systemd(sudo:session): Cannot create session: Already running in a session or user slice
Oct 22 17:24:03 vmfsppjb006 sudo[38555]: pam_unix(sudo:session): session opened for user root by (uid=0)
Oct 22 17:24:03 vmfsppjb006 sudo[38555]: pam_unix(sudo:session): session closed for user root
Oct 22 17:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:24:37 vmfsppjb006 dbus-daemon[38628]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:24:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:24:38 vmfsppjb006 setroubleshoot[38628]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:24:39 vmfsppjb006 setroubleshoot[38628]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:24:39 vmfsppjb006 platform-python[38628]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:25:01 vmfsppjb006 CROND[38662]: (root) CMD (/usr/sbin/logrotate -s /var/lib/logrotate/omsagent-status /etc/logrotate.d/omsagent* >/dev/null 2>&1)
Oct 22 17:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:25:37 vmfsppjb006 dbus-daemon[38698]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:25:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:25:38 vmfsppjb006 setroubleshoot[38698]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:25:39 vmfsppjb006 setroubleshoot[38698]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:25:39 vmfsppjb006 platform-python[38698]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:30:01 vmfsppjb006 CROND[38967]: (root) CMD (/usr/sbin/logrotate -s /var/lib/logrotate/omsagent-status /etc/logrotate.d/omsagent* >/dev/null 2>&1)
Oct 22 17:30:01 vmfsppjb006 CROND[38968]: (root) CMD (/usr/sbin/logrotate /etc/logrotate.d/omi --state /var/opt/omi/log/omi-logrotate.status >/dev/null 2>&1)
Oct 22 17:32:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:32:37 vmfsppjb006 dbus-daemon[39112]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:32:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:32:38 vmfsppjb006 setroubleshoot[39112]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:32:39 vmfsppjb006 setroubleshoot[39112]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:32:39 vmfsppjb006 platform-python[39112]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:35:01 vmfsppjb006 CROND[39261]: (root) CMD (/usr/sbin/logrotate -s /var/lib/logrotate/omsagent-status /etc/logrotate.d/omsagent* >/dev/null 2>&1)
Oct 22 17:35:23 vmfsppjb006 python3.6[1575]: 2021-10-22T08:35:23.717280Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 17;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 17:37:27 vmfsppjb006 systemd[1]: Stopping System Logging Service...
Oct 22 17:37:27 vmfsppjb006 rsyslogd[37588]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="37588" x-info="https://www.rsyslog.com"] exiting on signal 15.
Oct 22 17:37:27 vmfsppjb006 systemd[1]: Stopped System Logging Service.
Oct 22 17:37:27 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 22 17:37:27 vmfsppjb006 rsyslogd[39414]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="39414" x-info="https://www.rsyslog.com"] start
Oct 22 17:37:27 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 22 17:37:27 vmfsppjb006 rsyslogd[39414]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 22 17:37:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:37:37 vmfsppjb006 dbus-daemon[39431]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:37:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:37:38 vmfsppjb006 setroubleshoot[39431]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:37:39 vmfsppjb006 setroubleshoot[39431]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:37:39 vmfsppjb006 platform-python[39431]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:39:01 vmfsppjb006 systemd[1]: Started Session 73 of user omsagent.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Started Session c22 of user root.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Reached target Paths.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Reached target Timers.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Starting D-Bus User Message Bus Socket.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Listening on D-Bus User Message Bus Socket.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Reached target Sockets.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Reached target Basic System.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Reached target Default.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Startup finished in 46ms.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Stopped target Default.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Stopped target Basic System.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Stopped target Sockets.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Closed D-Bus User Message Bus Socket.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Stopped target Timers.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Stopped target Paths.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Reached target Shutdown.
Oct 22 17:39:33 vmfsppjb006 systemd[39738]: Starting Exit the Session...
Oct 22 17:39:33 vmfsppjb006 systemd[1]: user@0.service: Killing process 39772 (systemctl) with signal SIGKILL.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 17:39:33 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 17:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:39:37 vmfsppjb006 dbus-daemon[39798]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:39:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:39:38 vmfsppjb006 setroubleshoot[39798]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:39:39 vmfsppjb006 setroubleshoot[39798]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:39:39 vmfsppjb006 platform-python[39798]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:40:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:40:37 vmfsppjb006 dbus-daemon[39859]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:40:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:40:38 vmfsppjb006 setroubleshoot[39859]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:40:39 vmfsppjb006 setroubleshoot[39859]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:40:39 vmfsppjb006 platform-python[39859]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:45:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:45:37 vmfsppjb006 dbus-daemon[40164]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:45:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:45:38 vmfsppjb006 setroubleshoot[40164]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:45:39 vmfsppjb006 setroubleshoot[40164]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:45:39 vmfsppjb006 platform-python[40164]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:54:01 vmfsppjb006 systemd[1]: Started Session 75 of user omsagent.
Oct 22 17:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:54:37 vmfsppjb006 dbus-daemon[40804]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:54:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:54:38 vmfsppjb006 setroubleshoot[40804]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:54:39 vmfsppjb006 setroubleshoot[40804]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:54:39 vmfsppjb006 platform-python[40804]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 17:55:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 17:55:38 vmfsppjb006 dbus-daemon[40873]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 17:55:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 17:55:38 vmfsppjb006 setroubleshoot[40873]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 17:55:39 vmfsppjb006 setroubleshoot[40873]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 17:55:39 vmfsppjb006 platform-python[40873]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:01:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:01:37 vmfsppjb006 dbus-daemon[41243]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:01:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:01:37 vmfsppjb006 setroubleshoot[41243]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:01:38 vmfsppjb006 setroubleshoot[41243]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:01:38 vmfsppjb006 platform-python[41243]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:04:35 vmfsppjb006 python3.6[1575]: 2021-10-22T09:04:35.677752Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 18:05:22 vmfsppjb006 systemd[1]: Stopping Jobarranger Monitor...
Oct 22 18:05:22 vmfsppjb006 journal[14700]: Job Arranger Monitor[14700]: Got signal [signal:15(SIGTERM),sender_pid:41475,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:05:22 vmfsppjb006 journal[14700]: Job Arranger Monitor[14700]: Job Arranger monitor stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 18:05:22 vmfsppjb006 systemd[1]: Stopped Jobarranger Monitor.
Oct 22 18:05:22 vmfsppjb006 systemd[1]: Starting Jobarranger Monitor...
Oct 22 18:05:22 vmfsppjb006 systemd[1]: jobarg-monitor.service: Can't open PID file /run/jobarranger/jobarg_monitor.pid (yet?) after start: No such file or directory
Oct 22 18:05:22 vmfsppjb006 journal[41480]: Job Arranger Monitor[41480]: Starting Job Arranger monitor. Job Arranger 5.0.1 (revision 7557).
Oct 22 18:05:22 vmfsppjb006 journal[41481]: Job Arranger Monitor[41481]: jobarg_monitor #0 started [monitor]
Oct 22 18:05:22 vmfsppjb006 systemd[1]: Started Jobarranger Monitor.
Oct 22 18:05:23 vmfsppjb006 python3.6[1575]: 2021-10-22T09:05:23.874677Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 18;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 18:05:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:05:37 vmfsppjb006 dbus-daemon[41498]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:05:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:05:38 vmfsppjb006 setroubleshoot[41498]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:05:38 vmfsppjb006 setroubleshoot[41498]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:05:38 vmfsppjb006 platform-python[41498]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:09:01 vmfsppjb006 systemd[1]: Started Session 76 of user omsagent.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Started Session c23 of user root.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Reached target Paths.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Reached target Timers.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Starting D-Bus User Message Bus Socket.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Listening on D-Bus User Message Bus Socket.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Reached target Sockets.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Reached target Basic System.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Reached target Default.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Startup finished in 45ms.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Stopped target Default.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Stopped target Basic System.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Stopped target Paths.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Stopped target Timers.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Stopped target Sockets.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Closed D-Bus User Message Bus Socket.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Reached target Shutdown.
Oct 22 18:09:35 vmfsppjb006 systemd[41922]: Starting Exit the Session...
Oct 22 18:09:35 vmfsppjb006 systemd[1]: user@0.service: Killing process 41956 (systemctl) with signal SIGKILL.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 18:09:35 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 18:09:38 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:09:38 vmfsppjb006 dbus-daemon[41972]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:09:39 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:09:39 vmfsppjb006 setroubleshoot[41972]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:09:39 vmfsppjb006 setroubleshoot[41972]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:09:39 vmfsppjb006 platform-python[41972]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:10:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:10:37 vmfsppjb006 dbus-daemon[42040]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:10:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:10:37 vmfsppjb006 setroubleshoot[42040]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:10:38 vmfsppjb006 setroubleshoot[42040]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:10:38 vmfsppjb006 platform-python[42040]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:10:46 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 22 18:10:46 vmfsppjb006 journal[22684]: Job Arranger Server[22684]: Got signal [signal:15(SIGTERM),sender_pid:42054,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22685]: Job Arranger Server[22685]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22686]: Job Arranger Server[22686]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22687]: Job Arranger Server[22687]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22688]: Job Arranger Server[22688]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22689]: Job Arranger Server[22689]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22690]: Job Arranger Server[22690]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22691]: Job Arranger Server[22691]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22692]: Job Arranger Server[22692]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22693]: Job Arranger Server[22693]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22694]: Job Arranger Server[22694]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22695]: Job Arranger Server[22695]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:46 vmfsppjb006 journal[22696]: Job Arranger Server[22696]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 22 18:10:48 vmfsppjb006 journal[22684]: Job Arranger Server[22684]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 22 18:10:48 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 22 18:12:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:12:37 vmfsppjb006 dbus-daemon[42163]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:12:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:12:38 vmfsppjb006 setroubleshoot[42163]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:12:38 vmfsppjb006 setroubleshoot[42163]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:12:38 vmfsppjb006 platform-python[42163]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:14:26 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 18:14:27 vmfsppjb006 dnf[42279]: packages-microsoft-com-prod                      12 kB/s | 3.0 kB     00:00
Oct 22 18:14:27 vmfsppjb006 dnf[42279]: MySQL 8.0 Community Server                      128 kB/s | 2.6 kB     00:00
Oct 22 18:14:27 vmfsppjb006 dnf[42279]: MySQL Connectors Community                      103 kB/s | 2.6 kB     00:00
Oct 22 18:14:27 vmfsppjb006 dnf[42279]: MySQL Tools Community                            48 kB/s | 2.6 kB     00:00
Oct 22 18:14:28 vmfsppjb006 dnf[42279]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.0 kB/s | 2.4 kB     00:00
Oct 22 18:14:28 vmfsppjb006 dnf[42279]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.8 kB/s | 2.8 kB     00:00
Oct 22 18:14:29 vmfsppjb006 dnf[42279]: Microsoft Azure RPMs for RHEL8 Extended Update  6.6 kB/s | 2.1 kB     00:00
Oct 22 18:14:29 vmfsppjb006 dnf[42279]: Zabbix Official Repository - x86_64              13 kB/s | 2.9 kB     00:00
Oct 22 18:14:29 vmfsppjb006 dnf[42279]: Zabbix Official Repository non-supported - x86_ 9.2 kB/s | 3.0 kB     00:00
Oct 22 18:14:30 vmfsppjb006 dnf[42279]: Metadata cache created.
Oct 22 18:14:30 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 18:16:22 vmfsppjb006 journal[41481]: Job Arranger Monitor[41481]: [JAMONITOR200002] In ja_sender() jobnet_id 'JOBNET_1' can not be not run on schedule time '202110221815'. calendar_id: CALENDAR_1, schedule_id: SCHEDULE_1, user_name: Admin
Oct 22 18:17:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:17:37 vmfsppjb006 dbus-daemon[42479]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:17:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:17:38 vmfsppjb006 setroubleshoot[42479]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:17:38 vmfsppjb006 setroubleshoot[42479]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:17:38 vmfsppjb006 platform-python[42479]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:23:33 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 22 18:23:33 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 22 18:23:33 vmfsppjb006 journal[42834]: Job Arranger Server[42834]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 22 18:23:33 vmfsppjb006 journal[42834]: Job Arranger Server[42834]: [JASERVER000003] server #0 started [main process]
Oct 22 18:23:33 vmfsppjb006 journal[42845]: Job Arranger Server[42845]: [JASERVER000004] server #11 started [message send #1]
Oct 22 18:23:33 vmfsppjb006 journal[42846]: Job Arranger Server[42846]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 22 18:23:33 vmfsppjb006 journal[42844]: Job Arranger Server[42844]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 22 18:23:33 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 22 18:23:33 vmfsppjb006 journal[42841]: Job Arranger Server[42841]: [JASERVER000004] server #7 started [job trapper #4]
Oct 22 18:23:33 vmfsppjb006 journal[42836]: Job Arranger Server[42836]: [JASERVER000004] server #2 started [start the job #1]
Oct 22 18:23:33 vmfsppjb006 journal[42837]: Job Arranger Server[42837]: [JASERVER000004] server #3 started [check the running job #1]
Oct 22 18:23:33 vmfsppjb006 journal[42838]: Job Arranger Server[42838]: [JASERVER000004] server #4 started [job trapper #1]
Oct 22 18:23:33 vmfsppjb006 journal[42839]: Job Arranger Server[42839]: [JASERVER000004] server #5 started [job trapper #2]
Oct 22 18:23:33 vmfsppjb006 journal[42840]: Job Arranger Server[42840]: [JASERVER000004] server #6 started [job trapper #3]
Oct 22 18:23:33 vmfsppjb006 journal[42843]: Job Arranger Server[42843]: [JASERVER000004] server #9 started [job loader #1]
Oct 22 18:23:33 vmfsppjb006 journal[42835]: Job Arranger Server[42835]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 22 18:23:33 vmfsppjb006 journal[42842]: Job Arranger Server[42842]: [JASERVER000004] server #8 started [job trapper #5]
Oct 22 18:23:33 vmfsppjb006 journal[42835]: Job Arranger Server[42835]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000139, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 18:23:33 vmfsppjb006 journal[42835]: Job Arranger Server[42835]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000140, jobnet_id: JOBNET_2, user_name: Admin
Oct 22 18:24:01 vmfsppjb006 systemd[1]: Started Session 78 of user omsagent.
Oct 22 18:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:24:37 vmfsppjb006 dbus-daemon[43025]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:24:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:24:38 vmfsppjb006 setroubleshoot[43025]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:24:38 vmfsppjb006 setroubleshoot[43025]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:24:38 vmfsppjb006 platform-python[43025]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:25:37 vmfsppjb006 dbus-daemon[43093]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:25:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:25:38 vmfsppjb006 setroubleshoot[43093]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:25:38 vmfsppjb006 setroubleshoot[43093]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:25:38 vmfsppjb006 platform-python[43093]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:27:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:27:37 vmfsppjb006 dbus-daemon[43216]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:27:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:27:38 vmfsppjb006 setroubleshoot[43216]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:27:38 vmfsppjb006 setroubleshoot[43216]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:27:38 vmfsppjb006 platform-python[43216]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:35:27 vmfsppjb006 python3.6[1575]: 2021-10-22T09:35:27.026742Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 19;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 18:39:01 vmfsppjb006 systemd[1]: Started Session 79 of user omsagent.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Started Session c24 of user root.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Starting D-Bus User Message Bus Socket.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Reached target Timers.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Reached target Paths.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Listening on D-Bus User Message Bus Socket.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Reached target Sockets.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Reached target Basic System.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Reached target Default.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Startup finished in 45ms.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Stopped target Default.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Stopped target Basic System.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Stopped target Sockets.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Closed D-Bus User Message Bus Socket.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Stopped target Timers.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Stopped target Paths.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Reached target Shutdown.
Oct 22 18:39:37 vmfsppjb006 systemd[44101]: Starting Exit the Session...
Oct 22 18:39:37 vmfsppjb006 systemd[1]: user@0.service: Killing process 44136 (systemctl) with signal SIGKILL.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 18:39:37 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 18:40:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 18:40:37 vmfsppjb006 dbus-daemon[44212]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 18:40:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 18:40:38 vmfsppjb006 setroubleshoot[44212]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 18:40:39 vmfsppjb006 setroubleshoot[44212]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 18:40:39 vmfsppjb006 platform-python[44212]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 18:54:01 vmfsppjb006 systemd[1]: Started Session 81 of user omsagent.
Oct 22 19:04:38 vmfsppjb006 python3.6[1575]: 2021-10-22T10:04:38.526067Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 22 19:05:32 vmfsppjb006 python3.6[1575]: 2021-10-22T10:05:32.744033Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 20;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 19:09:01 vmfsppjb006 systemd[1]: Started Session 82 of user omsagent.
Oct 22 19:09:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:09:37 vmfsppjb006 dbus-daemon[46200]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:09:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:09:39 vmfsppjb006 setroubleshoot[46200]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:09:40 vmfsppjb006 setroubleshoot[46200]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:09:40 vmfsppjb006 platform-python[46200]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Started Session c25 of user root.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Reached target Timers.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Reached target Paths.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Starting D-Bus User Message Bus Socket.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Listening on D-Bus User Message Bus Socket.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Reached target Sockets.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Reached target Basic System.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Reached target Default.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Startup finished in 45ms.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Stopped target Default.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Stopped target Basic System.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Stopped target Timers.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Stopped target Sockets.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Closed D-Bus User Message Bus Socket.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Stopped target Paths.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Reached target Shutdown.
Oct 22 19:09:40 vmfsppjb006 systemd[46235]: Starting Exit the Session...
Oct 22 19:09:40 vmfsppjb006 systemd[1]: user@0.service: Killing process 46269 (systemctl) with signal SIGKILL.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 19:09:40 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 19:10:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:10:37 vmfsppjb006 dbus-daemon[46335]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:10:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:10:37 vmfsppjb006 setroubleshoot[46335]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:10:38 vmfsppjb006 setroubleshoot[46335]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:10:38 vmfsppjb006 platform-python[46335]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:14:32 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 22 19:14:33 vmfsppjb006 dnf[46568]: Metadata cache refreshed recently.
Oct 22 19:14:33 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 22 19:14:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:14:37 vmfsppjb006 dbus-daemon[46574]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:14:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:14:37 vmfsppjb006 setroubleshoot[46574]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:14:38 vmfsppjb006 setroubleshoot[46574]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:14:38 vmfsppjb006 platform-python[46574]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:15:13 vmfsppjb006 systemd-logind[923]: Session 6 logged out. Waiting for processes to exit.
Oct 22 19:15:13 vmfsppjb006 systemd-logind[923]: Removed session 6.
Oct 22 19:15:18 vmfsppjb006 systemd-logind[923]: Session 3 logged out. Waiting for processes to exit.
Oct 22 19:15:18 vmfsppjb006 systemd-logind[923]: Removed session 3.
Oct 22 19:15:22 vmfsppjb006 systemd-logind[923]: Session 36 logged out. Waiting for processes to exit.
Oct 22 19:15:22 vmfsppjb006 systemd-logind[923]: Removed session 36.
Oct 22 19:15:24 vmfsppjb006 systemd-logind[923]: Session 1 logged out. Waiting for processes to exit.
Oct 22 19:15:24 vmfsppjb006 systemd-logind[923]: Removed session 1.
Oct 22 19:15:24 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 22 19:15:24 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1000...
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Stopped target Default.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Stopped target Basic System.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Stopped target Paths.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Stopped target Timers.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Stopped target Sockets.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Closed D-Bus User Message Bus Socket.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Reached target Shutdown.
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: Starting Exit the Session...
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: selinux: avc:  received policyload notice (seqno=2)
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: selinux: avc:  received policyload notice (seqno=3)
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: selinux: avc:  received policyload notice (seqno=4)
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: selinux: avc:  received policyload notice (seqno=5)
Oct 22 19:15:24 vmfsppjb006 systemd[6269]: selinux: avc:  received policyload notice (seqno=6)
Oct 22 19:15:24 vmfsppjb006 systemd[1]: user@1000.service: Killing process 46645 (systemctl) with signal SIGKILL.
Oct 22 19:15:24 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 22 19:15:24 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1000.
Oct 22 19:15:24 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 22 19:15:24 vmfsppjb006 systemd[1]: Stopping /run/user/1000 mount wrapper...
Oct 22 19:15:24 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1000.
Oct 22 19:15:24 vmfsppjb006 systemd[1]: Stopped /run/user/1000 mount wrapper.
Oct 22 19:15:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:15:37 vmfsppjb006 dbus-daemon[46667]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:15:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:15:37 vmfsppjb006 setroubleshoot[46667]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:15:38 vmfsppjb006 setroubleshoot[46667]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:15:38 vmfsppjb006 platform-python[46667]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:20:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:20:37 vmfsppjb006 dbus-daemon[46964]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:20:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:20:37 vmfsppjb006 setroubleshoot[46964]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:20:38 vmfsppjb006 setroubleshoot[46964]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:20:38 vmfsppjb006 platform-python[46964]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:24:01 vmfsppjb006 systemd[1]: Started Session 84 of user omsagent.
Oct 22 19:24:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:24:37 vmfsppjb006 dbus-daemon[47318]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:24:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:24:38 vmfsppjb006 setroubleshoot[47318]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:24:38 vmfsppjb006 setroubleshoot[47318]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:24:38 vmfsppjb006 platform-python[47318]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:25:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:25:37 vmfsppjb006 dbus-daemon[47386]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:25:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:25:38 vmfsppjb006 setroubleshoot[47386]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:25:38 vmfsppjb006 setroubleshoot[47386]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:25:38 vmfsppjb006 platform-python[47386]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:35:37 vmfsppjb006 python3.6[1575]: 2021-10-22T10:35:37.542480Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 21;HeartbeatId: 27DA7E28-1925-4FF4-97B0-4CDE527B5C83;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 22 19:39:01 vmfsppjb006 systemd[1]: Started Session 85 of user omsagent.
Oct 22 19:39:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:39:37 vmfsppjb006 dbus-daemon[48314]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:39:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:39:38 vmfsppjb006 setroubleshoot[48314]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:39:38 vmfsppjb006 setroubleshoot[48314]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:39:38 vmfsppjb006 platform-python[48314]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Started Session c26 of user root.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Starting D-Bus User Message Bus Socket.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Reached target Timers.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Reached target Paths.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Listening on D-Bus User Message Bus Socket.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Reached target Sockets.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Reached target Basic System.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Reached target Default.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Startup finished in 44ms.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Stopped target Default.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Stopped target Basic System.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Stopped target Paths.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Stopped target Timers.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Stopped target Sockets.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Closed D-Bus User Message Bus Socket.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Reached target Shutdown.
Oct 22 19:39:42 vmfsppjb006 systemd[48395]: Starting Exit the Session...
Oct 22 19:39:42 vmfsppjb006 systemd[1]: user@0.service: Killing process 48431 (systemctl) with signal SIGKILL.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 22 19:39:42 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 22 19:40:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:40:37 vmfsppjb006 dbus-daemon[48508]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:40:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:40:38 vmfsppjb006 setroubleshoot[48508]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:40:38 vmfsppjb006 setroubleshoot[48508]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:40:38 vmfsppjb006 platform-python[48508]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:42:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:42:37 vmfsppjb006 dbus-daemon[48624]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:42:37 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:42:38 vmfsppjb006 setroubleshoot[48624]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:42:38 vmfsppjb006 setroubleshoot[48624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:42:38 vmfsppjb006 platform-python[48624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:54:01 vmfsppjb006 systemd[1]: Started Session 87 of user omsagent.
Oct 22 19:54:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:54:37 vmfsppjb006 dbus-daemon[49439]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:54:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:54:38 vmfsppjb006 setroubleshoot[49439]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:54:39 vmfsppjb006 setroubleshoot[49439]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:54:39 vmfsppjb006 platform-python[49439]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 22 19:55:37 vmfsppjb006 dbus-daemon[881]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.41' (uid=0 pid=848 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 22 19:55:37 vmfsppjb006 dbus-daemon[49507]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 22 19:55:38 vmfsppjb006 dbus-daemon[881]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 22 19:55:38 vmfsppjb006 setroubleshoot[49507]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 22 19:55:39 vmfsppjb006 setroubleshoot[49507]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 22 19:55:39 vmfsppjb006 platform-python[49507]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:01:23 vmfsppjb006 kernel: Command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Oct 25 09:01:23 vmfsppjb006 kernel: x86/fpu: Enabled xstate features 0xff, context size is 2560 bytes, using 'compacted' format.
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-provided physical RAM map:
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ffeffff] usable
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003fff0000-0x000000003fffefff] ACPI data
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] ACPI NVS
Oct 25 09:01:23 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable
Oct 25 09:01:23 vmfsppjb006 kernel: printk: bootconsole [earlyser0] enabled
Oct 25 09:01:23 vmfsppjb006 kernel: NX (Execute Disable) protection: active
Oct 25 09:01:23 vmfsppjb006 kernel: SMBIOS 2.3 present.
Oct 25 09:01:23 vmfsppjb006 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008  12/07/2018
Oct 25 09:01:23 vmfsppjb006 kernel: Hypervisor detected: Microsoft Hyper-V
Oct 25 09:01:23 vmfsppjb006 kernel: Hyper-V: features 0x2e7f, hints 0x60c2c
Oct 25 09:01:23 vmfsppjb006 kernel: Hyper-V Host Build:18362-10.0-3-0.3356
Oct 25 09:01:23 vmfsppjb006 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40
Oct 25 09:01:23 vmfsppjb006 kernel: tsc: Marking TSC unstable due to running on Hyper-V
Oct 25 09:01:23 vmfsppjb006 kernel: Hyper-V: Using hypercall for remote TLB flush
Oct 25 09:01:23 vmfsppjb006 kernel: tsc: Detected 2593.906 MHz processor
Oct 25 09:01:23 vmfsppjb006 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000
Oct 25 09:01:23 vmfsppjb006 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct 25 09:01:23 vmfsppjb006 kernel: last_pfn = 0x3fff0 max_arch_pfn = 0x400000000
Oct 25 09:01:23 vmfsppjb006 kernel: found SMP MP-table at [mem 0x000ff780-0x000ff78f]
Oct 25 09:01:23 vmfsppjb006 kernel: kexec: Reserving the low 1M of memory for crashkernel
Oct 25 09:01:23 vmfsppjb006 kernel: Using GB pages for direct mapping
Oct 25 09:01:23 vmfsppjb006 kernel: RAMDISK: [mem 0x34c8a000-0x3663cfff]
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Early table checksum verification disabled
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: RSDP 0x00000000000F5C00 000014 (v00 ACPIAM)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: RSDT 0x000000003FFF0000 000040 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: FACP 0x000000003FFF0200 000081 (v02 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: DSDT 0x000000003FFF1D24 003CD5 (v01 MSFTVM MSFTVM02 00000002 INTL 02002026)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: FACS 0x000000003FFFF000 000040
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: WAET 0x000000003FFF1A80 000028 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SLIC 0x000000003FFF1AC0 000176 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: OEM0 0x000000003FFF1CC0 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SRAT 0x000000003FFF0800 000130 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: APIC 0x000000003FFF0300 00005A (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: OEMB 0x000000003FFFF040 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 25 09:01:23 vmfsppjb006 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x13fffffff] hotplug
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x140200000-0xfdfffffff] hotplug
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000200000-0x1ffffffffff] hotplug
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000200000-0x3ffffffffff] hotplug
Oct 25 09:01:23 vmfsppjb006 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x13fffffff] -> [mem 0x00000000-0x13fffffff]
Oct 25 09:01:23 vmfsppjb006 kernel: NODE_DATA(0) allocated [mem 0x13ffd6000-0x13fffffff]
Oct 25 09:01:23 vmfsppjb006 kernel: Using crashkernel=auto, the size chosen is a best effort estimation.
Oct 25 09:01:23 vmfsppjb006 kernel: Reserving 160MB of memory at 672MB for crashkernel (System RAM: 2047MB)
Oct 25 09:01:23 vmfsppjb006 kernel: Zone ranges:
Oct 25 09:01:23 vmfsppjb006 kernel:  DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct 25 09:01:23 vmfsppjb006 kernel:  DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Oct 25 09:01:23 vmfsppjb006 kernel:  Normal   [mem 0x0000000100000000-0x000000013fffffff]
Oct 25 09:01:23 vmfsppjb006 kernel:  Device   empty
Oct 25 09:01:23 vmfsppjb006 kernel: Movable zone start for each node
Oct 25 09:01:23 vmfsppjb006 kernel: Early memory node ranges
Oct 25 09:01:23 vmfsppjb006 kernel:  node   0: [mem 0x0000000000001000-0x000000000009efff]
Oct 25 09:01:23 vmfsppjb006 kernel:  node   0: [mem 0x0000000000100000-0x000000003ffeffff]
Oct 25 09:01:23 vmfsppjb006 kernel:  node   0: [mem 0x0000000100000000-0x000000013fffffff]
Oct 25 09:01:23 vmfsppjb006 kernel: Zeroed struct page in unavailable ranges: 114 pages
Oct 25 09:01:23 vmfsppjb006 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff]
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: PM-Timer IO Port: 0x408
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Oct 25 09:01:23 vmfsppjb006 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct 25 09:01:23 vmfsppjb006 kernel: Using ACPI (MADT) for SMP configuration information
Oct 25 09:01:23 vmfsppjb006 kernel: smpboot: Allowing 1 CPUs, 0 hotplug CPUs
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff]
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff]
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff]
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3fff0000-0x3fffefff]
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3ffff000-0x3fffffff]
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x40000000-0xffffffff]
Oct 25 09:01:23 vmfsppjb006 kernel: [mem 0x40000000-0xffffffff] available for PCI devices
Oct 25 09:01:23 vmfsppjb006 kernel: Booting paravirtualized kernel on bare hardware
Oct 25 09:01:23 vmfsppjb006 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct 25 09:01:23 vmfsppjb006 kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:1 nr_cpu_ids:1 nr_node_ids:1
Oct 25 09:01:23 vmfsppjb006 kernel: percpu: Embedded 53 pages/cpu s180224 r8192 d28672 u2097152
Oct 25 09:01:23 vmfsppjb006 kernel: Hyper-V: PV spinlocks enabled
Oct 25 09:01:23 vmfsppjb006 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 515824
Oct 25 09:01:23 vmfsppjb006 kernel: Policy zone: Normal
Oct 25 09:01:23 vmfsppjb006 kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 25 09:01:23 vmfsppjb006 kernel: Specific versions of hardware are certified with Red Hat Enterprise Linux 8. Please see the list of hardware certified with Red Hat Enterprise Linux 8 at https://access.redhat.com/ecosystem.
Oct 25 09:01:23 vmfsppjb006 kernel: Memory: 922868K/2096696K available (12292K kernel code, 2152K rwdata, 3852K rodata, 2408K init, 6468K bss, 324976K reserved, 0K cma-reserved)
Oct 25 09:01:23 vmfsppjb006 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Oct 25 09:01:23 vmfsppjb006 kernel: Kernel/User page tables isolation: enabled
Oct 25 09:01:23 vmfsppjb006 kernel: ftrace: allocating 36349 entries in 142 pages
Oct 25 09:01:23 vmfsppjb006 kernel: rcu: Hierarchical RCU implementation.
Oct 25 09:01:23 vmfsppjb006 kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=1.
Oct 25 09:01:23 vmfsppjb006 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct 25 09:01:23 vmfsppjb006 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
Oct 25 09:01:23 vmfsppjb006 kernel: NR_IRQS: 524544, nr_irqs: 256, preallocated irqs: 16
Oct 25 09:01:23 vmfsppjb006 kernel: random: get_random_bytes called from start_kernel+0x36b/0x55b with crng_init=0
Oct 25 09:01:23 vmfsppjb006 kernel: Console: colour VGA+ 80x25
Oct 25 09:01:23 vmfsppjb006 kernel: printk: console [tty1] enabled
Oct 25 09:01:23 vmfsppjb006 kernel: printk: console [ttyS0] enabled
Oct 25 09:01:23 vmfsppjb006 kernel: printk: bootconsole [earlyser0] disabled
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Core revision 20190703
Oct 25 09:01:23 vmfsppjb006 kernel: APIC: Switch to symmetric I/O mode setup
Oct 25 09:01:23 vmfsppjb006 kernel: Hyper-V: Using IPI hypercalls
Oct 25 09:01:23 vmfsppjb006 kernel: Hyper-V: Using MSR based APIC access
Oct 25 09:01:23 vmfsppjb006 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns
Oct 25 09:01:23 vmfsppjb006 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
Oct 25 09:01:23 vmfsppjb006 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906)
Oct 25 09:01:23 vmfsppjb006 kernel: pid_max: default: 32768 minimum: 301
Oct 25 09:01:23 vmfsppjb006 kernel: Security Framework initialized
Oct 25 09:01:23 vmfsppjb006 kernel: Yama: becoming mindful.
Oct 25 09:01:23 vmfsppjb006 kernel: SELinux:  Initializing.
Oct 25 09:01:23 vmfsppjb006 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Oct 25 09:01:23 vmfsppjb006 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Oct 25 09:01:23 vmfsppjb006 kernel: FEATURE SPEC_CTRL Not Present
Oct 25 09:01:23 vmfsppjb006 kernel: FEATURE IBPB_SUPPORT Not Present
Oct 25 09:01:23 vmfsppjb006 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct 25 09:01:23 vmfsppjb006 kernel: Spectre V2 : Mitigation: Full generic retpoline
Oct 25 09:01:23 vmfsppjb006 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct 25 09:01:23 vmfsppjb006 kernel: Speculative Store Bypass: Vulnerable
Oct 25 09:01:23 vmfsppjb006 kernel: TAA: Mitigation: Clear CPU buffers
Oct 25 09:01:23 vmfsppjb006 kernel: MDS: Mitigation: Clear CPU buffers
Oct 25 09:01:23 vmfsppjb006 kernel: Freeing SMP alternatives memory: 32K
Oct 25 09:01:23 vmfsppjb006 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7)
Oct 25 09:01:23 vmfsppjb006 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Oct 25 09:01:23 vmfsppjb006 kernel: rcu: Hierarchical SRCU implementation.
Oct 25 09:01:23 vmfsppjb006 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Oct 25 09:01:23 vmfsppjb006 kernel: smp: Bringing up secondary CPUs ...
Oct 25 09:01:23 vmfsppjb006 kernel: smp: Brought up 1 node, 1 CPU
Oct 25 09:01:23 vmfsppjb006 kernel: smpboot: Max logical packages: 1
Oct 25 09:01:23 vmfsppjb006 kernel: smpboot: Total of 1 processors activated (5187.81 BogoMIPS)
Oct 25 09:01:23 vmfsppjb006 kernel: node 0 initialised, 212213 pages in 1ms
Oct 25 09:01:23 vmfsppjb006 kernel: devtmpfs: initialized
Oct 25 09:01:23 vmfsppjb006 kernel: x86/mm: Memory block size: 128MB
Oct 25 09:01:23 vmfsppjb006 kernel: PM: Registering ACPI NVS region [mem 0x3ffff000-0x3fffffff] (4096 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct 25 09:01:23 vmfsppjb006 kernel: futex hash table entries: 256 (order: 2, 16384 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: pinctrl core: initialized pinctrl subsystem
Oct 25 09:01:23 vmfsppjb006 kernel: NET: Registered protocol family 16
Oct 25 09:01:23 vmfsppjb006 kernel: audit: initializing netlink subsys (disabled)
Oct 25 09:01:23 vmfsppjb006 kernel: cpuidle: using governor menu
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: bus type PCI registered
Oct 25 09:01:23 vmfsppjb006 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct 25 09:01:23 vmfsppjb006 kernel: PCI: Using configuration type 1 for base access
Oct 25 09:01:23 vmfsppjb006 kernel: audit: type=2000 audit(1635120080.115:1): state=initialized audit_enabled=0 res=1
Oct 25 09:01:23 vmfsppjb006 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct 25 09:01:23 vmfsppjb006 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct 25 09:01:23 vmfsppjb006 kernel: cryptd: max_cpu_qlen set to 1000
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Added _OSI(Module Device)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Device)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Interpreter enabled
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: (supports S0 S5)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Using IOAPIC for interrupt routing
Oct 25 09:01:23 vmfsppjb006 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Oct 25 09:01:23 vmfsppjb006 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Oct 25 09:01:23 vmfsppjb006 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Oct 25 09:01:23 vmfsppjb006 kernel: PCI host bridge to bus 0000:00
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0xfe0000000-0xfffffffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x40000000-0xfffbffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:00.0: [8086:7192] type 00 class 0x060000
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x010180
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.1: reg 0x20: [io  0xffa0-0xffaf]
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000
Oct 25 09:01:23 vmfsppjb006 kernel: * Found PM-Timer Bug on the chipset. Due to workarounds for a bug,#012* this clock source is slow. Consider trying other clock sources
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:07.3: quirk: [io  0x0400-0x043f] claimed by PIIX4 ACPI
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:08.0: [1414:5353] type 00 class 0x030000
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:08.0: reg 0x10: [mem 0xf8000000-0xfbffffff]
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 7 9 10 *11 12 14 15)
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 25 09:01:23 vmfsppjb006 kernel: iommu: Default domain type: Passthrough 
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: setting as boot VGA device
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: bridge control possible
Oct 25 09:01:23 vmfsppjb006 kernel: vgaarb: loaded
Oct 25 09:01:23 vmfsppjb006 kernel: SCSI subsystem initialized
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: bus type USB registered
Oct 25 09:01:23 vmfsppjb006 kernel: usbcore: registered new interface driver usbfs
Oct 25 09:01:23 vmfsppjb006 kernel: usbcore: registered new interface driver hub
Oct 25 09:01:23 vmfsppjb006 kernel: usbcore: registered new device driver usb
Oct 25 09:01:23 vmfsppjb006 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct 25 09:01:23 vmfsppjb006 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct 25 09:01:23 vmfsppjb006 kernel: PTP clock support registered
Oct 25 09:01:23 vmfsppjb006 kernel: EDAC MC: Ver: 3.0.0
Oct 25 09:01:23 vmfsppjb006 kernel: PCI: Using ACPI for IRQ routing
Oct 25 09:01:23 vmfsppjb006 kernel: NetLabel: Initializing
Oct 25 09:01:23 vmfsppjb006 kernel: NetLabel:  domain hash size = 128
Oct 25 09:01:23 vmfsppjb006 kernel: NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
Oct 25 09:01:23 vmfsppjb006 kernel: NetLabel:  unlabeled traffic allowed by default
Oct 25 09:01:23 vmfsppjb006 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page
Oct 25 09:01:23 vmfsppjb006 kernel: VFS: Disk quotas dquot_6.6.0
Oct 25 09:01:23 vmfsppjb006 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: pnp: PnP ACPI init
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:06: [io  0x01e0-0x01ef] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:06: [io  0x0160-0x016f] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:06: [io  0x0278-0x027f] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:06: [io  0x0378-0x037f] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:06: [io  0x0678-0x067f] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:06: [io  0x0778-0x077f] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:06: [io  0x04d0-0x04d1] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:07: [io  0x0400-0x043f] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:07: [io  0x0370-0x0371] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:07: [io  0x0440-0x044f] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:07: [mem 0xfec00000-0xfec00fff] could not be reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:07: [mem 0xfee00000-0xfee00fff] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:08: [mem 0x00000000-0x0009ffff] could not be reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:08: [mem 0x000c0000-0x000dffff] could not be reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:08: [mem 0x000e0000-0x000fffff] could not be reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:08: [mem 0x00100000-0x3fffffff] could not be reserved
Oct 25 09:01:23 vmfsppjb006 kernel: system 00:08: [mem 0xfffc0000-0xffffffff] has been reserved
Oct 25 09:01:23 vmfsppjb006 kernel: pnp: PnP ACPI: found 9 devices
Oct 25 09:01:23 vmfsppjb006 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: resource 4 [mem 0xfe0000000-0xfffffffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: resource 5 [io  0x0000-0x0cf7 window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: resource 6 [io  0x0d00-0xffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: resource 7 [mem 0x000a0000-0x000bffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: pci_bus 0000:00: resource 8 [mem 0x40000000-0xfffbffff window]
Oct 25 09:01:23 vmfsppjb006 kernel: NET: Registered protocol family 2
Oct 25 09:01:23 vmfsppjb006 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Oct 25 09:01:23 vmfsppjb006 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes)
Oct 25 09:01:23 vmfsppjb006 kernel: NET: Registered protocol family 1
Oct 25 09:01:23 vmfsppjb006 kernel: NET: Registered protocol family 44
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Oct 25 09:01:23 vmfsppjb006 kernel: pci 0000:00:08.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Oct 25 09:01:23 vmfsppjb006 kernel: PCI: CLS 0 bytes, default 64
Oct 25 09:01:23 vmfsppjb006 kernel: Unpacking initramfs...
Oct 25 09:01:23 vmfsppjb006 kernel: Freeing initrd memory: 26316K
Oct 25 09:01:23 vmfsppjb006 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Oct 25 09:01:23 vmfsppjb006 kernel: software IO TLB: mapped [mem 0x3bff0000-0x3fff0000] (64MB)
Oct 25 09:01:23 vmfsppjb006 kernel: Initialise system trusted keyrings
Oct 25 09:01:23 vmfsppjb006 kernel: Key type blacklist registered
Oct 25 09:01:23 vmfsppjb006 kernel: workingset: timestamp_bits=36 max_order=19 bucket_order=0
Oct 25 09:01:23 vmfsppjb006 kernel: zbud: loaded
Oct 25 09:01:23 vmfsppjb006 kernel: pstore: using deflate compression
Oct 25 09:01:23 vmfsppjb006 kernel: Platform Keyring initialized
Oct 25 09:01:23 vmfsppjb006 kernel: NET: Registered protocol family 38
Oct 25 09:01:23 vmfsppjb006 kernel: Key type asymmetric registered
Oct 25 09:01:23 vmfsppjb006 kernel: Asymmetric key parser 'x509' registered
Oct 25 09:01:23 vmfsppjb006 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246)
Oct 25 09:01:23 vmfsppjb006 kernel: io scheduler mq-deadline registered
Oct 25 09:01:23 vmfsppjb006 kernel: io scheduler kyber registered
Oct 25 09:01:23 vmfsppjb006 kernel: io scheduler bfq registered
Oct 25 09:01:23 vmfsppjb006 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE
Oct 25 09:01:23 vmfsppjb006 kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
Oct 25 09:01:23 vmfsppjb006 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
Oct 25 09:01:23 vmfsppjb006 kernel: ACPI: Power Button [PWRF]
Oct 25 09:01:23 vmfsppjb006 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct 25 09:01:23 vmfsppjb006 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct 25 09:01:23 vmfsppjb006 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Oct 25 09:01:23 vmfsppjb006 kernel: Non-volatile memory driver v1.3
Oct 25 09:01:23 vmfsppjb006 kernel: rdac: device handler registered
Oct 25 09:01:23 vmfsppjb006 kernel: hp_sw: device handler registered
Oct 25 09:01:23 vmfsppjb006 kernel: emc: device handler registered
Oct 25 09:01:23 vmfsppjb006 kernel: alua: device handler registered
Oct 25 09:01:23 vmfsppjb006 kernel: libphy: Fixed MDIO Bus: probed
Oct 25 09:01:23 vmfsppjb006 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Oct 25 09:01:23 vmfsppjb006 kernel: ehci-pci: EHCI PCI platform driver
Oct 25 09:01:23 vmfsppjb006 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Oct 25 09:01:23 vmfsppjb006 kernel: ohci-pci: OHCI PCI platform driver
Oct 25 09:01:23 vmfsppjb006 kernel: uhci_hcd: USB Universal Host Controller Interface driver
Oct 25 09:01:23 vmfsppjb006 kernel: usbcore: registered new interface driver usbserial_generic
Oct 25 09:01:23 vmfsppjb006 kernel: usbserial: USB Serial support registered for generic
Oct 25 09:01:23 vmfsppjb006 kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12
Oct 25 09:01:23 vmfsppjb006 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Oct 25 09:01:23 vmfsppjb006 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Oct 25 09:01:23 vmfsppjb006 kernel: mousedev: PS/2 mouse device common for all mice
Oct 25 09:01:23 vmfsppjb006 kernel: rtc_cmos 00:00: RTC can wake from S4
Oct 25 09:01:23 vmfsppjb006 kernel: rtc_cmos 00:00: registered as rtc0
Oct 25 09:01:23 vmfsppjb006 kernel: rtc_cmos 00:00: alarms up to one month, 114 bytes nvram
Oct 25 09:01:23 vmfsppjb006 kernel: intel_pstate: CPU model not supported
Oct 25 09:01:23 vmfsppjb006 kernel: hidraw: raw HID events driver (C) Jiri Kosina
Oct 25 09:01:23 vmfsppjb006 kernel: usbcore: registered new interface driver usbhid
Oct 25 09:01:23 vmfsppjb006 kernel: usbhid: USB HID core driver
Oct 25 09:01:23 vmfsppjb006 kernel: drop_monitor: Initializing network drop monitor service
Oct 25 09:01:23 vmfsppjb006 kernel: Initializing XFRM netlink socket
Oct 25 09:01:23 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1
Oct 25 09:01:23 vmfsppjb006 kernel: NET: Registered protocol family 10
Oct 25 09:01:23 vmfsppjb006 kernel: Segment Routing with IPv6
Oct 25 09:01:23 vmfsppjb006 kernel: NET: Registered protocol family 17
Oct 25 09:01:23 vmfsppjb006 kernel: mpls_gso: MPLS GSO support
Oct 25 09:01:23 vmfsppjb006 kernel: core: Using 1 MCE banks
Oct 25 09:01:23 vmfsppjb006 kernel: AVX2 version of gcm_enc/dec engaged.
Oct 25 09:01:23 vmfsppjb006 kernel: AES CTR mode by8 optimization enabled
Oct 25 09:01:23 vmfsppjb006 kernel: registered taskstats version 1
Oct 25 09:01:23 vmfsppjb006 kernel: Loading compiled-in X.509 certificates
Oct 25 09:01:23 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 6510a14606da3bfa607738428a62729c5d677293'
Oct 25 09:01:23 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80'
Oct 25 09:01:23 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8'
Oct 25 09:01:23 vmfsppjb006 kernel: zswap: loaded using pool lzo/zbud
Oct 25 09:01:23 vmfsppjb006 kernel: Key type big_key registered
Oct 25 09:01:23 vmfsppjb006 kernel: Key type encrypted registered
Oct 25 09:01:23 vmfsppjb006 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct 25 09:01:23 vmfsppjb006 kernel: ima: Allocated hash algorithm: sha1
Oct 25 09:01:23 vmfsppjb006 kernel: evm: Initialising EVM extended attributes:
Oct 25 09:01:23 vmfsppjb006 kernel: evm: security.selinux
Oct 25 09:01:23 vmfsppjb006 kernel: evm: security.ima
Oct 25 09:01:23 vmfsppjb006 kernel: evm: security.capability
Oct 25 09:01:23 vmfsppjb006 kernel: evm: HMAC attrs: 0x1
Oct 25 09:01:23 vmfsppjb006 kernel: rtc_cmos 00:00: setting system clock to 2021-10-25 00:01:22 UTC (1635120082)
Oct 25 09:01:23 vmfsppjb006 kernel: Unstable clock detected, switching default tracing clock to "global"#012If you want to keep using the local clock, then add:#012  "trace_clock=local"#012on the kernel command line
Oct 25 09:01:23 vmfsppjb006 kernel: Freeing unused decrypted memory: 2040K
Oct 25 09:01:23 vmfsppjb006 kernel: Freeing unused kernel memory: 2408K
Oct 25 09:01:23 vmfsppjb006 kernel: Write protecting the kernel read-only data: 18432k
Oct 25 09:01:23 vmfsppjb006 kernel: Freeing unused kernel memory: 2020K
Oct 25 09:01:23 vmfsppjb006 kernel: Freeing unused kernel memory: 244K
Oct 25 09:01:23 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Running in initial RAM disk.
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Set hostname to <pkrvmlk3jhumuhr>.
Oct 25 09:01:23 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Listening on Journal Socket (/dev/log).
Oct 25 09:01:23 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Listening on udev Control Socket.
Oct 25 09:01:23 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Reached target Local File Systems.
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
Oct 25 09:01:23 vmfsppjb006 systemd[1]: Reached target Timers.
Oct 25 09:01:23 vmfsppjb006 kernel: psmouse serio1: trackpoint: failed to get extended button data, assuming 3 buttons
Oct 25 09:01:23 vmfsppjb006 systemd-journald[268]: Journal started
Oct 25 09:01:23 vmfsppjb006 systemd-journald[268]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 25 09:01:23 vmfsppjb006 rngd[264]: Initializing available sources
Oct 25 09:01:23 vmfsppjb006 rngd[264]: Failed to init entropy source hwrng
Oct 25 09:01:23 vmfsppjb006 rngd[264]: Enabling RDSEED rng support
Oct 25 09:01:23 vmfsppjb006 rngd[264]: Initializing entropy source rdrand
Oct 25 09:01:24 vmfsppjb006 systemd[1]: Started Apply Kernel Variables.
Oct 25 09:01:24 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 25 09:01:24 vmfsppjb006 systemd[1]: Starting Create Static Device Nodes in /dev...
Oct 25 09:01:24 vmfsppjb006 systemd[1]: Started Create Static Device Nodes in /dev.
Oct 25 09:01:24 vmfsppjb006 kernel: random: fast init done
Oct 25 09:01:25 vmfsppjb006 systemd[1]: Started Setup Virtual Console.
Oct 25 09:01:25 vmfsppjb006 systemd[1]: Starting dracut cmdline hook...
Oct 25 09:01:25 vmfsppjb006 dracut-cmdline[279]: dracut-8.2 (Ootpa) dracut-049-70.git20200228.el8
Oct 25 09:01:25 vmfsppjb006 dracut-cmdline[279]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 25 09:01:25 vmfsppjb006 systemd[1]: Started dracut cmdline hook.
Oct 25 09:01:25 vmfsppjb006 systemd[1]: Starting dracut pre-udev hook...
Oct 25 09:01:25 vmfsppjb006 kernel: device-mapper: uevent: version 1.0.3
Oct 25 09:01:25 vmfsppjb006 kernel: device-mapper: ioctl: 4.39.0-ioctl (2018-04-03) initialised: dm-devel@redhat.com
Oct 25 09:01:25 vmfsppjb006 systemd[1]: Started dracut pre-udev hook.
Oct 25 09:01:25 vmfsppjb006 systemd[1]: Starting udev Kernel Device Manager...
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Starting udev Coldplug all Devices...
Oct 25 09:01:26 vmfsppjb006 kernel: psmouse serio1: trackpoint: IBM TrackPoint firmware: 0x01, buttons: 3/3
Oct 25 09:01:26 vmfsppjb006 kernel: input: TPPS/2 IBM TrackPoint as /devices/platform/i8042/serio1/input/input3
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Mounting Kernel Configuration File System...
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Mounted Kernel Configuration File System.
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Started udev Coldplug all Devices.
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Starting dracut initqueue hook...
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 25 09:01:26 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 25 09:01:26 vmfsppjb006 kernel: hv_vmbus: Vmbus version:4.0
Oct 25 09:01:26 vmfsppjb006 systemd-udevd[427]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 25 09:01:26 vmfsppjb006 kernel: hv_vmbus: Unknown GUID: c376c1c3-d276-48d2-90a9-c04748072c60
Oct 25 09:01:27 vmfsppjb006 kernel: hv_vmbus: registering driver hid_hyperv
Oct 25 09:01:27 vmfsppjb006 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input4
Oct 25 09:01:27 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_keyboard
Oct 25 09:01:27 vmfsppjb006 kernel: hid-generic 0006:045E:0621.0001: input: <UNKNOWN> HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on 
Oct 25 09:01:27 vmfsppjb006 kernel: hv_vmbus: registering driver hv_storvsc
Oct 25 09:01:27 vmfsppjb006 kernel: hv_vmbus: registering driver hv_netvsc
Oct 25 09:01:27 vmfsppjb006 kernel: ata_piix 0000:00:07.1: Hyper-V Virtual Machine detected, ATA device ignore set
Oct 25 09:01:27 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:07/VMBUS:01/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio2/input/input5
Oct 25 09:01:27 vmfsppjb006 kernel: scsi host0: storvsc_host_t
Oct 25 09:01:27 vmfsppjb006 kernel: scsi host1: storvsc_host_t
Oct 25 09:01:27 vmfsppjb006 kernel: scsi 0:0:0:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 25 09:01:27 vmfsppjb006 kernel: scsi host3: storvsc_host_t
Oct 25 09:01:27 vmfsppjb006 kernel: scsi host2: storvsc_host_t
Oct 25 09:01:27 vmfsppjb006 kernel: scsi: waiting for bus probes to complete ...
Oct 25 09:01:27 vmfsppjb006 kernel: scsi 1:0:1:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 25 09:01:27 vmfsppjb006 kernel: scsi host4: ata_piix
Oct 25 09:01:27 vmfsppjb006 kernel: scsi host5: ata_piix
Oct 25 09:01:27 vmfsppjb006 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0xffa0 irq 14
Oct 25 09:01:27 vmfsppjb006 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0xffa8 irq 15
Oct 25 09:01:27 vmfsppjb006 systemd-udevd[424]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 25 09:01:27 vmfsppjb006 kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 0
Oct 25 09:01:27 vmfsppjb006 kernel: scsi 1:0:1:0: Attached scsi generic sg1 type 0
Oct 25 09:01:27 vmfsppjb006 kernel: sd 0:0:0:0: [sda] 134217728 512-byte logical blocks: (68.7 GB/64.0 GiB)
Oct 25 09:01:27 vmfsppjb006 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Oct 25 09:01:27 vmfsppjb006 kernel: sd 0:0:0:0: [sda] Write Protect is off
Oct 25 09:01:27 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] 8388608 512-byte logical blocks: (4.29 GB/4.00 GiB)
Oct 25 09:01:27 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] 4096-byte physical blocks
Oct 25 09:01:27 vmfsppjb006 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA
Oct 25 09:01:27 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] Write Protect is off
Oct 25 09:01:27 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] Write cache: disabled, read cache: enabled, supports DPO and FUA
Oct 25 09:01:27 vmfsppjb006 kernel: sdb: sdb1
Oct 25 09:01:27 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] Attached SCSI disk
Oct 25 09:01:27 vmfsppjb006 kernel: sda: sda1 sda2 sda14 sda15
Oct 25 09:01:27 vmfsppjb006 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Oct 25 09:01:27 vmfsppjb006 rngd[264]: Initializing AES buffer
Oct 25 09:01:27 vmfsppjb006 rngd[264]: Enabling JITTER rng support
Oct 25 09:01:29 vmfsppjb006 dracut-initqueue[432]: Scanning devices sda2  for LVM volume groups
Oct 25 09:01:29 vmfsppjb006 dracut-initqueue[432]: Found volume group "rootvg" using metadata type lvm2
Oct 25 09:01:29 vmfsppjb006 kernel: random: crng init done
Oct 25 09:01:29 vmfsppjb006 kernel: random: 7 urandom warning(s) missed due to ratelimiting
Oct 25 09:01:29 vmfsppjb006 dracut-initqueue[432]: 5 logical volume(s) in volume group "rootvg" now active
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Found device /dev/mapper/rootvg-rootlv.
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Started dracut initqueue hook.
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Reached target Remote File Systems (Pre).
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Reached target Remote File Systems.
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Reached target Initrd Root Device.
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Starting File System Check on /dev/mapper/rootvg-rootlv...
Oct 25 09:01:29 vmfsppjb006 systemd-fsck[563]: /usr/sbin/fsck.xfs: XFS file system.
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Started File System Check on /dev/mapper/rootvg-rootlv.
Oct 25 09:01:29 vmfsppjb006 systemd[1]: Mounting /sysroot...
Oct 25 09:01:29 vmfsppjb006 rngd[264]: Initializing entropy source jitter
Oct 25 09:01:29 vmfsppjb006 kernel: SGI XFS with ACLs, security attributes, no debug enabled
Oct 25 09:01:30 vmfsppjb006 kernel: XFS (dm-4): Mounting V5 Filesystem
Oct 25 09:01:30 vmfsppjb006 kernel: XFS (dm-4): Ending clean mount
Oct 25 09:01:30 vmfsppjb006 systemd[1]: Mounted /sysroot.
Oct 25 09:01:30 vmfsppjb006 systemd[1]: Reached target Initrd Root File System.
Oct 25 09:01:30 vmfsppjb006 systemd[1]: Starting Reload Configuration from the Real Root...
Oct 25 09:01:30 vmfsppjb006 systemd[1]: Reloading.
Oct 25 09:01:30 vmfsppjb006 systemd[1]: Mounting /sysroot/usr...
Oct 25 09:01:30 vmfsppjb006 systemd[1]: Started Reload Configuration from the Real Root.
Oct 25 09:01:30 vmfsppjb006 kernel: XFS (dm-1): Mounting V5 Filesystem
Oct 25 09:01:31 vmfsppjb006 kernel: XFS (dm-1): Ending clean mount
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Mounted /sysroot/usr.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Reached target Initrd File Systems.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Reached target Initrd Default Target.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Starting dracut pre-pivot and cleanup hook...
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Started dracut pre-pivot and cleanup hook.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Starting Cleaning Up and Shutting Down Daemons...
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped dracut pre-pivot and cleanup hook.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Initrd Default Target.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Timers.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Remote File Systems.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Remote File Systems (Pre).
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped dracut initqueue hook.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Basic System.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Slices.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Sockets.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Paths.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target System Initialization.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Swap.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopping udev Kernel Device Manager...
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped Apply Kernel Variables.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped udev Coldplug all Devices.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped Create Volatile Files and Directories.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Local File Systems.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped target Initrd Root Device.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped udev Kernel Device Manager.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Started Cleaning Up and Shutting Down Daemons.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped Create Static Device Nodes in /dev.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped Create list of required static device nodes for the current kernel.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon...
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped dracut pre-udev hook.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped dracut cmdline hook.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Closed udev Control Socket.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Closed udev Kernel Socket.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Starting Cleanup udevd DB...
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Started Cleanup udevd DB.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Reached target Switch Root.
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Starting Switch Root...
Oct 25 09:01:31 vmfsppjb006 systemd[1]: Switching root.
Oct 25 09:01:31 vmfsppjb006 systemd-journald[268]: Journal stopped
Oct 25 09:01:37 vmfsppjb006 systemd-journald[268]: Received SIGTERM from PID 1 (systemd).
Oct 25 09:01:37 vmfsppjb006 kernel: printk: systemd: 14 output lines suppressed due to ratelimiting
Oct 25 09:01:37 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 25 09:01:37 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 25 09:01:37 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 25 09:01:37 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 25 09:01:37 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 25 09:01:37 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 25 09:01:37 vmfsppjb006 kernel: audit: type=1403 audit(1635120094.251:2): auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Successfully loaded SELinux policy in 2.030189s.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Relabelled /dev, /run and /sys/fs/cgroup in 19.986ms.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Set hostname to <vmfsppjb006>.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Stopped Switch Root.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: systemd-journald.service: Service has no hold-off time (RestartSec=0), scheduling restart.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Stopped Journal Service.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Starting Journal Service...
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Listening on LVM2 poll daemon socket.
Oct 25 09:01:37 vmfsppjb006 kernel: XFS (sda1): Mounting V5 Filesystem
Oct 25 09:01:37 vmfsppjb006 kernel: XFS (dm-0): Mounting V5 Filesystem
Oct 25 09:01:37 vmfsppjb006 kernel: XFS (dm-2): Mounting V5 Filesystem
Oct 25 09:01:37 vmfsppjb006 kernel: XFS (dm-3): Mounting V5 Filesystem
Oct 25 09:01:37 vmfsppjb006 systemd-journald[698]: Journal started
Oct 25 09:01:37 vmfsppjb006 systemd-journald[698]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 25 09:01:37 vmfsppjb006 systemd-tmpfiles[721]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 25 09:01:37 vmfsppjb006 systemd-tmpfiles[721]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 25 09:01:37 vmfsppjb006 lvm[704]:  5 logical volume(s) in volume group "rootvg" monitored
Oct 25 09:01:37 vmfsppjb006 systemd-fsck[725]: fsck.fat 4.1 (2017-01-24)
Oct 25 09:01:37 vmfsppjb006 systemd-fsck[725]: /dev/sda15: 13 files, 883/63325 clusters
Oct 25 09:01:37 vmfsppjb006 kernel: XFS (dm-0): Ending clean mount
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Mounted /tmp.
Oct 25 09:01:37 vmfsppjb006 kernel: XFS (sda1): Ending clean mount
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Mounted /boot.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Mounting /boot/efi...
Oct 25 09:01:37 vmfsppjb006 systemd-resolved[719]: Positive Trust Anchors:
Oct 25 09:01:37 vmfsppjb006 systemd-resolved[719]: . IN DS 19036 8 2 49aac11d7b6f6446702e54a1607371607a1a41855200fd2ce1cdde32f24e8fb5
Oct 25 09:01:37 vmfsppjb006 systemd-resolved[719]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct 25 09:01:37 vmfsppjb006 systemd-resolved[719]: Negative trust anchors: 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct 25 09:01:37 vmfsppjb006 systemd-resolved[719]: Using system hostname 'vmfsppjb006'.
Oct 25 09:01:37 vmfsppjb006 kernel: XFS (dm-2): Ending clean mount
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Mounted /home.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Started Network Name Resolution.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Reached target Host and Network Name Lookups.
Oct 25 09:01:37 vmfsppjb006 systemd[1]: Mounted /boot/efi.
Oct 25 09:01:37 vmfsppjb006 kernel: hv_vmbus: registering driver hv_balloon
Oct 25 09:01:37 vmfsppjb006 kernel: hv_utils: Registering HyperV Utility Driver
Oct 25 09:01:37 vmfsppjb006 kernel: hv_vmbus: registering driver hv_utils
Oct 25 09:01:37 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_fb
Oct 25 09:01:38 vmfsppjb006 kernel: hyperv_fb: Screen resolution: 1152x864, Color depth: 32
Oct 25 09:01:38 vmfsppjb006 kernel: Console: switching to colour frame buffer device 144x54
Oct 25 09:01:38 vmfsppjb006 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0
Oct 25 09:01:38 vmfsppjb006 kernel: hv_utils: Heartbeat IC version 3.0
Oct 25 09:01:38 vmfsppjb006 kernel: hv_utils: Shutdown IC version 3.0
Oct 25 09:01:38 vmfsppjb006 systemd-udevd[778]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 25 09:01:38 vmfsppjb006 kernel: hv_utils: TimeSync IC version 4.0
Oct 25 09:01:38 vmfsppjb006 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6
Oct 25 09:01:38 vmfsppjb006 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Oct 25 09:01:38 vmfsppjb006 systemd-udevd[784]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 25 09:01:38 vmfsppjb006 kernel: piix4_smbus 0000:00:07.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr
Oct 25 09:01:38 vmfsppjb006 kernel: XFS (dm-3): Ending clean mount
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Found device Virtual_Disk Temporary_Storage.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Mounted /var.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Starting Flush Journal to Persistent Storage...
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Starting Load/Save Random Seed...
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Reached target Local File Systems.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Starting Import network configuration from initramfs...
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Starting Restore /run/initramfs on shutdown...
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Created slice system-lvm2\x2dpvscan.slice.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Starting LVM event activation on device 8:2...
Oct 25 09:01:38 vmfsppjb006 systemd-fsck[837]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Started Load/Save Random Seed.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Started Restore /run/initramfs on shutdown.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 25 09:01:38 vmfsppjb006 systemd-journald[698]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Started Flush Journal to Persistent Storage.
Oct 25 09:01:38 vmfsppjb006 lvm[839]:  pvscan[839] PV /dev/sda2 online, VG rootvg is complete.
Oct 25 09:01:38 vmfsppjb006 lvm[839]:  pvscan[839] VG rootvg run autoactivation.
Oct 25 09:01:38 vmfsppjb006 lvm[839]:  5 logical volume(s) in volume group "rootvg" now active
Oct 25 09:01:38 vmfsppjb006 systemd[1]: Started LVM event activation on device 8:2.
Oct 25 09:01:39 vmfsppjb006 systemd[1]: Started Import network configuration from initramfs.
Oct 25 09:01:39 vmfsppjb006 systemd[1]: Starting Create Volatile Files and Directories...
Oct 25 09:01:39 vmfsppjb006 systemd-tmpfiles[864]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 25 09:01:39 vmfsppjb006 systemd-tmpfiles[864]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 25 09:01:39 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 25 09:01:39 vmfsppjb006 systemd[1]: Starting Security Auditing Service...
Oct 25 09:01:39 vmfsppjb006 auditd[867]: audit dispatcher initialized with q_depth=400 and 1 active plugins
Oct 25 09:01:40 vmfsppjb006 auditd[867]: Init complete, auditd 3.0 listening for events (startup state enable)
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: /sbin/augenrules: No change
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: No rules
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: enabled 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: failure 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: pid 867
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: rate_limit 0
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog_limit 8192
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: lost 0
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog_wait_time 60000
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: enabled 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: failure 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: pid 867
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: rate_limit 0
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog_limit 8192
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: lost 0
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog_wait_time 60000
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: enabled 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: failure 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: pid 867
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: rate_limit 0
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog_limit 8192
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: lost 0
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog 1
Oct 25 09:01:40 vmfsppjb006 augenrules[872]: backlog_wait_time 60000
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started Security Auditing Service.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting Update UTMP about System Boot/Shutdown...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started Update UTMP about System Boot/Shutdown.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started dnf makecache --timer.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started daily update of the root trust anchor for DNSSEC.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Listening on D-Bus System Message Bus Socket.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (pre-networking)...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Reached target Sockets.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting NTP client/server...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting Hardware RNG Entropy Gatherer Wake threshold service...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started irqbalance daemon.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started libstoragemgmt plug-in server daemon.
Oct 25 09:01:40 vmfsppjb006 /usr/sbin/irqbalance[895]: Balancing is ineffective on systems with a single cpu.  Shutting down
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Reached target sshd-keygen.target.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting Authorization Manager...
Oct 25 09:01:40 vmfsppjb006 chronyd[902]: chronyd version 3.5 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 +DEBUG)
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started Machine Check Exception Logging Daemon.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting VDO volume services...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started Self Monitoring and Reporting Technology (SMART) Daemon.
Oct 25 09:01:40 vmfsppjb006 chronyd[902]: Frequency -20.985 +/- 0.011 ppm read from /var/lib/chrony/drift
Oct 25 09:01:40 vmfsppjb006 chronyd[902]: Using right/UTC timezone to obtain leap second data
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting System Security Services Daemon...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started D-Bus System Message Bus.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started Daily Cleanup of Temporary Directories.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Reached target Timers.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting Netfilter Tables...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Wake threshold service.
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Starting update of the root trust anchor for DNSSEC validation in unbound...
Oct 25 09:01:40 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon.
Oct 25 09:01:40 vmfsppjb006 smartd[906]: smartd 6.6 2017-11-05 r4594 [x86_64-linux-4.18.0-193.47.1.el8_2.x86_64] (local build)
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Copyright (C) 2002-17, Bruce Allen, Christian Franke, www.smartmontools.org
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Opened configuration file /etc/smartmontools/smartd.conf
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Device: /dev/sda, opened
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Device: /dev/sda, [Msft     Virtual Disk     1.0 ], lu id: 0x600224809c49d3a7764b86f8bc8c4cd0, 68.7 GB
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Device: /dev/sdb, opened
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Device: /dev/sdb, [Msft     Virtual Disk     1.0 ], lu id: 0x600224806aa4b5e05b76320ce39309bf, 4.29 GB
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Device: /dev/sdb, Bad IEC (SMART) mode page, err=5, skip device
Oct 25 09:01:40 vmfsppjb006 smartd[906]: Monitoring 0 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices
Oct 25 09:01:41 vmfsppjb006 systemd-resolved[719]: request_name_destroy_callback n_ref=1
Oct 25 09:01:41 vmfsppjb006 systemd[1]: Started Netfilter Tables.
Oct 25 09:01:41 vmfsppjb006 systemd[1]: Started NTP client/server.
Oct 25 09:01:41 vmfsppjb006 polkitd[903]: Started polkitd version 0.115
Oct 25 09:01:41 vmfsppjb006 rngd[915]: Initializing available sources
Oct 25 09:01:41 vmfsppjb006 rngd[915]: Failed to init entropy source hwrng
Oct 25 09:01:41 vmfsppjb006 rngd[915]: Enabling RDSEED rng support
Oct 25 09:01:41 vmfsppjb006 rngd[915]: Initializing entropy source rdrand
Oct 25 09:01:41 vmfsppjb006 sssd[908]: Starting up
Oct 25 09:01:41 vmfsppjb006 systemd[1]: Started update of the root trust anchor for DNSSEC validation in unbound.
Oct 25 09:01:41 vmfsppjb006 sssd[be[implicit_files]][933]: Starting up
Oct 25 09:01:41 vmfsppjb006 systemd[1]: Started Authorization Manager.
Oct 25 09:01:41 vmfsppjb006 systemd[1]: Starting firewalld - dynamic firewall daemon...
Oct 25 09:01:41 vmfsppjb006 sssd[nss][937]: Starting up
Oct 25 09:01:42 vmfsppjb006 systemd[1]: Started System Security Services Daemon.
Oct 25 09:01:42 vmfsppjb006 systemd[1]: Reached target User and Group Name Lookups.
Oct 25 09:01:42 vmfsppjb006 systemd[1]: Starting Login Service...
Oct 25 09:01:42 vmfsppjb006 systemd[1]: Started VDO volume services.
Oct 25 09:01:43 vmfsppjb006 systemd-logind[943]: New seat seat0.
Oct 25 09:01:43 vmfsppjb006 systemd-logind[943]: Watching system buttons on /dev/input/event0 (Power Button)
Oct 25 09:01:43 vmfsppjb006 systemd-logind[943]: Watching system buttons on /dev/input/event4 (AT Translated Set 2 keyboard)
Oct 25 09:01:43 vmfsppjb006 systemd-logind[943]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard)
Oct 25 09:01:43 vmfsppjb006 systemd[1]: Started Login Service.
Oct 25 09:01:43 vmfsppjb006 systemd[1]: Started firewalld - dynamic firewall daemon.
Oct 25 09:01:43 vmfsppjb006 firewalld[936]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future release. Please consider disabling it now.
Oct 25 09:01:44 vmfsppjb006 cloud-init[925]: Cloud-init v. 19.4 running 'init-local' at Mon, 25 Oct 2021 00:01:43 +0000. Up 22.22 seconds.
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Started Initial cloud-init job (pre-networking).
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Reached target Network (Pre).
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting Network Manager...
Oct 25 09:01:44 vmfsppjb006 NetworkManager[1056]: <info>  [1635120104.6971] NetworkManager (version 1.22.8-7.el8_2) is starting... (for the first time)
Oct 25 09:01:44 vmfsppjb006 NetworkManager[1056]: <info>  [1635120104.6979] Read config: /etc/NetworkManager/NetworkManager.conf
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Started Network Manager.
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting Network Manager Wait Online...
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Reached target Network.
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting Jobarranger Agent...
Oct 25 09:01:44 vmfsppjb006 NetworkManager[1056]: <info>  [1635120104.7217] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager"
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting Enable periodic update of entitlement certificates....
Oct 25 09:01:44 vmfsppjb006 NetworkManager[1056]: <info>  [1635120104.7404] manager[0x563078bc9090]: monitoring kernel firmware directory '/lib/firmware'.
Oct 25 09:01:44 vmfsppjb006 dbus-daemon[909]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.10' (uid=0 pid=1056 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting Dynamic System Tuning Daemon...
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting MySQL Server...
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Started Hyper-V KVP daemon.
Oct 25 09:01:44 vmfsppjb006 KVP[1075]: KVP starting; pid is:1075
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting The Apache HTTP Server...
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting The PHP FastCGI Process Manager...
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 25 09:01:44 vmfsppjb006 KVP[1075]: KVP LIC Version: 3.1
Oct 25 09:01:44 vmfsppjb006 kernel: hv_utils: KVP IC version 4.0
Oct 25 09:01:44 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 25 09:01:45 vmfsppjb006 systemd[1]: Started Enable periodic update of entitlement certificates..
Oct 25 09:01:45 vmfsppjb006 systemd[1]: jobarg-agentd.service: Can't open PID file /run/jobarranger/jobarg_agentd.pid (yet?) after start: No such file or directory
Oct 25 09:01:45 vmfsppjb006 systemd[1]: Starting Hostname Service...
Oct 25 09:01:45 vmfsppjb006 systemd[1]: Started Jobarranger Agent.
Oct 25 09:01:45 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 25 09:01:45 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 25 09:01:46 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.freedesktop.hostname1'
Oct 25 09:01:46 vmfsppjb006 systemd[1]: Started Hostname Service.
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1819] hostname: hostname: using hostnamed
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1820] hostname: hostname changed from (none) to "vmfsppjb006"
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1823] dns-mgr[0x563078bae250]: init: dns=default,systemd-resolved rc-manager=symlink
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1883] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-device-plugin-team.so)
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1884] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1888] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1892] manager: Networking is enabled by state file
Oct 25 09:01:46 vmfsppjb006 dbus-daemon[909]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.10' (uid=0 pid=1056 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.1929] dhcp-init: Using DHCP client 'dhclient'
Oct 25 09:01:46 vmfsppjb006 systemd[1]: Starting Network Manager Script Dispatcher Service...
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.2105] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-settings-plugin-ifcfg-rh.so")
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.2107] settings: Loaded settings plugin: keyfile (internal)
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.2153] device (lo): carrier: link connected
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.2171] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.2303] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2)
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.2412] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external')
Oct 25 09:01:46 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 25 09:01:46 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Oct 25 09:01:46 vmfsppjb006 systemd[1]: Started Network Manager Script Dispatcher Service.
Oct 25 09:01:46 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 25 09:01:46 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.3140] device (eth0): carrier: link connected
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.3659] device (eth0): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed')
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.3755] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.3826] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.3863] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed')
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.3905] manager: NetworkManager state is now CONNECTING
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.3936] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed')
Oct 25 09:01:46 vmfsppjb006 httpd[1076]: AH00558: httpd: Could not reliably determine the server's fully qualified domain name, using ::1. Set the 'ServerName' directive globally to suppress this message
Oct 25 09:01:46 vmfsppjb006 systemd[1]: Started Dynamic System Tuning Daemon.
Oct 25 09:01:46 vmfsppjb006 systemd[1]: Started The Apache HTTP Server.
Oct 25 09:01:46 vmfsppjb006 httpd[1076]: Server configured, listening on: port 80
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.9221] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed')
Oct 25 09:01:46 vmfsppjb006 NetworkManager[1056]: <info>  [1635120106.9227] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds)
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.0551] dhcp4 (eth0): dhclient started with pid 1512
Oct 25 09:01:47 vmfsppjb006 rngd[915]: Initializing AES buffer
Oct 25 09:01:47 vmfsppjb006 rngd[915]: Enabling JITTER rng support
Oct 25 09:01:47 vmfsppjb006 dhclient[1512]: DHCPREQUEST on eth0 to 255.255.255.255 port 67 (xid=0xf3da613c)
Oct 25 09:01:47 vmfsppjb006 dhclient[1512]: DHCPACK from 168.63.129.16 (xid=0xf3da613c)
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6894] dhcp4 (eth0):   address 10.30.70.10
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6895] dhcp4 (eth0):   plen 27 (255.255.255.224)
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0):   classless static route 168.63.129.16/32 gw 10.30.70.1
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0):   classless static route 169.254.169.254/32 gw 10.30.70.1
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0):   gateway 10.30.70.1
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0):   lease time 4294967295
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0):   nameserver '168.63.129.16'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0):   domain name 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0): option broadcast_address    => '10.30.70.31'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0): option dad_wait_time        => '0'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0): option dhcp_lease_time      => '4294967295'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0): option dhcp_message_type    => '5'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6896] dhcp4 (eth0): option dhcp_rebinding_time  => '4294967295'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option dhcp_renewal_time    => '4294967295'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option dhcp_server_identifier => '168.63.129.16'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option domain_name          => 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option domain_name_servers  => '168.63.129.16'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option expiry               => '5930087402'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option ip_address           => '10.30.70.10'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option network_number       => '10.30.70.0'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option next_server          => '168.63.129.16'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option private_245          => 'a8:3f:81:10'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option requested_broadcast_address => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option requested_classless_static_routes => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option requested_domain_name => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option requested_domain_name_servers => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option requested_domain_search => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6897] dhcp4 (eth0): option requested_host_name  => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_interface_mtu => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_ms_classless_static_routes => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_nis_domain => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_nis_servers => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_ntp_servers => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_rfc3442_classless_static_routes => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_root_path  => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_routers    => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_static_routes => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_subnet_mask => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_time_offset => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option requested_wpad       => '1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option rfc3442_classless_static_routes => '0 10 30 70 1 32 168 63 129 16 10 30 70 1 32 169 254 169 254 10 30 70 1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6898] dhcp4 (eth0): option routers              => '10.30.70.1'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6899] dhcp4 (eth0): option server_name          => 'TYO221071506053'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6899] dhcp4 (eth0): option subnet_mask          => '255.255.255.224'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6899] dhcp4 (eth0): option unknown_245          => 'a8:3f:81:10'
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6899] dhcp4 (eth0): state changed unknown -> extended
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6906] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed')
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6973] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed')
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6975] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed')
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6979] manager: NetworkManager state is now CONNECTED_LOCAL
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6985] manager: NetworkManager state is now CONNECTED_SITE
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.6986] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS
Oct 25 09:01:47 vmfsppjb006 dhclient[1512]: Timeout too large reducing to: 2147483646 (TIME_MAX - 1)
Oct 25 09:01:47 vmfsppjb006 dhclient[1512]: bound to 10.30.70.10 -- renewal in 4294967295 seconds.
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.8241] device (eth0): Activation: successful, device activated.
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.8247] manager: NetworkManager state is now CONNECTED_GLOBAL
Oct 25 09:01:47 vmfsppjb006 NetworkManager[1056]: <info>  [1635120107.8250] manager: startup complete
Oct 25 09:01:47 vmfsppjb006 systemd[1]: Started Network Manager Wait Online.
Oct 25 09:01:47 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (metadata service crawler)...
Oct 25 09:01:48 vmfsppjb006 systemd[1]: Started The PHP FastCGI Process Manager.
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: Cloud-init v. 19.4 running 'init' at Mon, 25 Oct 2021 00:01:49 +0000. Up 27.80 seconds.
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info++++++++++++++++++++++++++++++++++++++++
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: | Device |  Up  |           Address           |       Mask      | Scope  |     Hw-Address    |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |  eth0  | True |         10.30.70.10         | 255.255.255.224 | global | 00:22:48:68:76:f6 |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |  eth0  | True | fe80::222:48ff:fe68:76f6/64 |        .        |  link  | 00:22:48:68:76:f6 |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   lo   | True |          127.0.0.1          |    255.0.0.0    |  host  |         .         |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   lo   | True |           ::1/128           |        .        |  host  |         .         |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +++++++++++++++++++++++++++++++Route IPv4 info++++++++++++++++++++++++++++++++
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: | Route |   Destination   |  Gateway   |     Genmask     | Interface | Flags |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   0   |     0.0.0.0     | 10.30.70.1 |     0.0.0.0     |    eth0   |   UG  |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   1   |    10.30.70.0   |  0.0.0.0   | 255.255.255.224 |    eth0   |   U   |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   2   |  168.63.129.16  | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   3   | 169.254.169.254 | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: | Route | Destination | Gateway | Interface | Flags |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   1   |  fe80::/64  |    ::   |    eth0   |   U   |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   3   |    local    |    ::   |    eth0   |   U   |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: |   4   |   ff00::/8  |    ::   |    eth0   |   U   |
Oct 25 09:01:49 vmfsppjb006 cloud-init[1522]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 25 09:01:50 vmfsppjb006 rngd[915]: Initializing entropy source jitter
Oct 25 09:01:50 vmfsppjb006 kernel: sdb: sdb1
Oct 25 09:01:50 vmfsppjb006 systemd[1]: Stopped File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 25 09:01:51 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 25 09:01:51 vmfsppjb006 systemd-fsck[1576]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 25 09:01:51 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 25 09:01:53 vmfsppjb006 kernel: EXT4-fs (sdb1): mounted filesystem with ordered data mode. Opts: (null)
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Reloading.
Oct 25 09:01:53 vmfsppjb006 chronyd[902]: Selected source 194.0.5.123
Oct 25 09:01:53 vmfsppjb006 chronyd[902]: System clock TAI offset set to 37 seconds
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Started Initial cloud-init job (metadata service crawler).
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Reached target Cloud-config availability.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Reached target Network is Online.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Starting Apply the settings specified in cloud-config...
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Starting Crash recovery kernel arming...
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Started Azure Linux Agent.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Starting Permit User Sessions...
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Starting OpenSSH server daemon...
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Started Permit User Sessions.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Started Command Scheduler.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Started Getty on tty1.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Started Serial Getty on ttyS0.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Reached target Login Prompts.
Oct 25 09:01:53 vmfsppjb006 systemd[1]: Started Job spooling tools.
Oct 25 09:01:54 vmfsppjb006 systemd[1]: Started OpenSSH server daemon.
Oct 25 09:01:54 vmfsppjb006 rsyslogd[1638]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="1638" x-info="https://www.rsyslog.com"] start
Oct 25 09:01:54 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 25 09:01:54 vmfsppjb006 rsyslogd[1638]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 25 09:01:55 vmfsppjb006 cloud-init[1635]: Cloud-init v. 19.4 running 'modules:config' at Mon, 25 Oct 2021 00:01:54 +0000. Up 33.54 seconds.
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.160255Z INFO Daemon Azure Linux Agent Version:2.2.46
Oct 25 09:01:55 vmfsppjb006 systemd[1]: Started Apply the settings specified in cloud-config.
Oct 25 09:01:55 vmfsppjb006 systemd[1]: Starting Execute cloud user/final scripts...
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.263323Z INFO Daemon OS: redhat 8.2
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.265821Z INFO Daemon Python: 3.6.8
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.268638Z INFO Daemon CGroups Status: The cgroup filesystem is ready to use
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.273831Z INFO Daemon Run daemon
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.276646Z INFO Daemon No RDMA handler exists for distro='Red Hat Enterprise Linux' version='8.2'
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.317980Z INFO Daemon cloud-init is enabled: True
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.320867Z INFO Daemon Using cloud-init for provisioning
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.324066Z INFO Daemon Clean protocol and wireserver endpoint
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.329577Z INFO Daemon Provisioning already completed, skipping.
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.332971Z INFO Daemon RDMA capabilities are not enabled, skipping
Oct 25 09:01:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:55.377240Z INFO Daemon Determined Agent WALinuxAgent-2.5.0.2 to be the latest agent
Oct 25 09:01:55 vmfsppjb006 kdumpctl[1636]: Detected change(s) in the following file(s):
Oct 25 09:01:55 vmfsppjb006 kdumpctl[1636]:  
Oct 25 09:01:55 vmfsppjb006 kdumpctl[1636]:  /etc/fstab
Oct 25 09:01:55 vmfsppjb006 kdumpctl[1636]: Rebuilding /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img
Oct 25 09:01:56 vmfsppjb006 cloud-init[1719]: Cloud-init v. 19.4 running 'modules:final' at Mon, 25 Oct 2021 00:01:55 +0000. Up 34.41 seconds.
Oct 25 09:01:56 vmfsppjb006 cloud-init[1719]: Cloud-init v. 19.4 finished at Mon, 25 Oct 2021 00:01:56 +0000. Datasource DataSourceAzure [seed=/dev/sr0].  Up 34.69 seconds
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.241485Z INFO ExtHandler ExtHandler The agent will now check for updates and then will process extensions. Output to /dev/console will be suspended during those operations.
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.340920Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.5.0.2 is running as the goal state agent
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.341126Z INFO ExtHandler ExtHandler Detect protocol endpoint
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.341191Z INFO ExtHandler ExtHandler Clean protocol and wireserver endpoint
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.341274Z INFO ExtHandler ExtHandler WireServer endpoint is not found. Rerun dhcp handler
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.341328Z INFO ExtHandler ExtHandler Test for route to 168.63.129.16
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.341515Z INFO ExtHandler ExtHandler Route to 168.63.129.16 exists
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.341581Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.567780Z INFO ExtHandler ExtHandler Fabric preferred wire protocol version:2015-04-05
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.568254Z INFO ExtHandler ExtHandler Wire protocol version:2012-11-30
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.568309Z INFO ExtHandler ExtHandler Server preferred version:2015-04-05
Oct 25 09:01:56 vmfsppjb006 echo[1797]: trying to reload or restart NetworkManager.service
Oct 25 09:01:56 vmfsppjb006 systemd[1]: Reloading Network Manager.
Oct 25 09:01:56 vmfsppjb006 NetworkManager[1056]: <info>  [1635120116.7100] audit: op="reload" arg="0" pid=1918 uid=0 result="success"
Oct 25 09:01:56 vmfsppjb006 NetworkManager[1056]: <info>  [1635120116.7105] config: signal: SIGHUP (no changes from disk)
Oct 25 09:01:56 vmfsppjb006 systemd[1]: Reloaded Network Manager.
Oct 25 09:01:56 vmfsppjb006 systemd[1]: Started Execute cloud user/final scripts.
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.909167Z INFO ExtHandler ExtHandler Initializing goal state during protocol detection
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.915495Z INFO ExtHandler ExtHandler Fetching new goal state [incarnation 1 (force update)]
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.969425Z INFO ExtHandler ExtHandler Found private key matching thumbprint 2B6277480C379B12B16319C50E5D1116370CC6BE
Oct 25 09:01:56 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:56.974069Z INFO ExtHandler ExtHandler Fetch goal state completed
Oct 25 09:01:57 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:57.250293Z INFO ExtHandler ExtHandler Distro: redhat-8.2; OSUtil: RedhatOSUtil; AgentService: waagent; Python: 3.6.8; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.14.0;
Oct 25 09:01:57 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:57.254506Z INFO ExtHandler ExtHandler WALinuxAgent-2.5.0.2 running as process 1737
Oct 25 09:01:57 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:57.257033Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['redhat', '8.2', 'Ootpa', 'Red Hat Enterprise Linux']
Oct 25 09:01:57 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:57.267101Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct 25 09:01:57 vmfsppjb006 dracut[2014]: dracut-049-70.git20200228.el8
Oct 25 09:01:57 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:57.809518Z INFO ExtHandler ExtHandler Firewalld.service present on the VM, setting up permanent rules on the VM
Oct 25 09:01:58 vmfsppjb006 dracut[2016]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o "plymouth dash resume ifcfg earlykdump" --mount "/dev/mapper/rootvg-varlv /kdumproot//var xfs defaults,noauto" --no-hostonly-default-device -f /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img 4.18.0-193.47.1.el8_2.x86_64
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.604237Z INFO ExtHandler ExtHandler Firewall rules already set. No change needed.
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.604774Z INFO ExtHandler ExtHandler Persistent firewall rules setup successfully
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.605575Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True]
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.608855Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.608991Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.609306Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.609512Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: Iface#011Destination#011Gateway #011Flags#011RefCnt#011Use#011Metric#011Mask#011#011MTU#011Window#011IRTT
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: eth0#01100000000#01101461E0A#0110003#0110#0110#011100#01100000000#0110#0110#0110
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: eth0#01100461E0A#01100000000#0110001#0110#0110#011100#011E0FFFFFF#0110#0110#0110
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: eth0#01110813FA8#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: eth0#011FEA9FEA9#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.610592Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.617028Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.617352Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.617721Z INFO EnvHandler ExtHandler Configure routes
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.617800Z INFO EnvHandler ExtHandler Gateway:None
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.617858Z INFO EnvHandler ExtHandler Routes:None
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.618268Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.622944Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.623551Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.629756Z INFO MonitorHandler ExtHandler Network interfaces:
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: Executing ['ip', '-a', '-o', 'link']:
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:68:76:f6 brd ff:ff:ff:ff:ff:ff
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2: eth0    inet 10.30.70.10/27 brd 10.30.70.31 scope global noprefixroute eth0\       valid_lft forever preferred_lft forever
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2: eth0    inet6 fe80::222:48ff:fe68:76f6/64 scope link \       valid_lft forever preferred_lft forever
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.632764Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.633240Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.635253Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.641105Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.765420Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState started [Incarnation: 1; Activity Id: 4fccc13b-8332-46a6-b65f-a0a4a419db7c; Correlation Id: fe7a5bdc-6b78-4387-9989-4edaa6ac25d5; GS Creation Time: 2021-10-25T00:00:54.478706Z]
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.766078Z INFO ExtHandler ExtHandler No extension/run-time settings settings found for Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.805161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Target handler state: enabled [incarnation 1]
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.806085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] [Enable] current handler state is: enabled
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.806213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Update settings file: 0.settings
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.806477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Requested extension state: enabled
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.807092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Enable extension: [./install.sh enable]
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.807439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.1974.1", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.858619Z INFO EnvHandler ExtHandler Set block dev timeout: sdb with timeout: 300
Oct 25 09:01:58 vmfsppjb006 python3.6[1639]: 2021-10-25T00:01:58.858811Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300
Oct 25 09:01:58 vmfsppjb006 dracut[2016]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 25 09:01:58 vmfsppjb006 dracut[2016]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 25 09:01:59 vmfsppjb006 dracut[2016]: dracut module 'ifcfg' will not be installed, because it's in the list to be omitted!
Oct 25 09:01:59 vmfsppjb006 dracut[2016]: dracut module 'plymouth' will not be installed, because it's in the list to be omitted!
Oct 25 09:02:00 vmfsppjb006 dracut[2016]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 25 09:02:00 vmfsppjb006 dracut[2016]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 25 09:02:00 vmfsppjb006 dracut[2016]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'resume' will not be installed, because it's in the list to be omitted!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'earlykdump' will not be installed, because it's in the list to be omitted!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 25 09:02:01 vmfsppjb006 dracut[2016]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 25 09:02:02 vmfsppjb006 dracut[2016]: *** Including module: bash ***
Oct 25 09:02:02 vmfsppjb006 dracut[2016]: *** Including module: systemd ***
Oct 25 09:02:03 vmfsppjb006 dracut[2016]: *** Including module: systemd-initrd ***
Oct 25 09:02:03 vmfsppjb006 dracut[2016]: *** Including module: nss-softokn ***
Oct 25 09:02:04 vmfsppjb006 dracut[2016]: *** Including module: rngd ***
Oct 25 09:02:04 vmfsppjb006 dracut[2016]: *** Including module: i18n ***
Oct 25 09:02:04 vmfsppjb006 dracut[2016]: *** Including module: drm ***
Oct 25 09:02:04 vmfsppjb006 dracut[2016]: *** Including module: prefixdevname ***
Oct 25 09:02:04 vmfsppjb006 dracut[2016]: *** Including module: dm ***
Oct 25 09:02:05 vmfsppjb006 dracut[2016]: Skipping udev rule: 64-device-mapper.rules
Oct 25 09:02:05 vmfsppjb006 dracut[2016]: Skipping udev rule: 60-persistent-storage-dm.rules
Oct 25 09:02:05 vmfsppjb006 dracut[2016]: Skipping udev rule: 55-dm.rules
Oct 25 09:02:05 vmfsppjb006 dracut[2016]: *** Including module: kernel-modules ***
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: *** Including module: kernel-modules-extra ***
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: *** Including module: lvm ***
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: Skipping udev rule: 64-device-mapper.rules
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: Skipping udev rule: 56-lvm.rules
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: Skipping udev rule: 60-persistent-storage-lvm.rules
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: *** Including module: fstab-sys ***
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: *** Including module: rootfs-block ***
Oct 25 09:02:06 vmfsppjb006 dracut[2016]: *** Including module: terminfo ***
Oct 25 09:02:07 vmfsppjb006 dracut[2016]: *** Including module: udev-rules ***
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:07.833770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Command: ./install.sh enable
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: [stdout]
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: Checking if system is supported
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: This system is supported
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: Enabling Azure Network Watcher Agent
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: Force kill all NetworkWatcher Agent related processes
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: Linux version 4.18.0-193.47.1.el8_2.x86_64 (mockbuild@x86-vm-07.build.eng.bos.redhat.com) (gcc version 8.3.1 20191121 (Red Hat 8.3.1-5) (GCC)) #1 SMP Thu Mar 4 03:03:32 EST 2021
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: Setting up Red Hat environment for SSL handshakes
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: Starting AzureNetworkWatcherAgent...Started[0]
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: Core limit: 0
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: [stderr]
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    echo "Disabling Azure Network Watcher Agent"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    forceKillOldAgent
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: }
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: uninstall()
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: {
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    echo "Uninstalling Azure Network Watcher Agent"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    forceKillOldAgent
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: }
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: install()
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: {
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    echo "Installing Azure Network Watcher Agent"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    forceKillOldAgent
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    continueOnUpdateFailureConfigured
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    if [ $? -eq 1 ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        if [ $? -eq 1 ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:            echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:            uninstall
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        fi
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    fi
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: }
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: update()
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: {
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    echo "Updating Azure Network Watcher Agent"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    continueOnUpdateFailureConfigured
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    if [ $? -eq 1 ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        if [ $? -eq 1 ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:            echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:            disable
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        fi
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    fi
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    install
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: }
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: enable()
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: {
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    echo "Enabling Azure Network Watcher Agent"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    forceKillOldAgent
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    /etc/init.d/AzureNetworkWatcherAgent start
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # after agent start the process controller forks child process that
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # initializing the environmet writing X.status file in
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # /var/lib/waagent/NWA folder. Unfortunately until environment is received
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # the status file could not be created since environment contains all the
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # informaton about destination folder, seq id etc. If X.status file is not
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # there waagent caused a failure that is shown in UI as deployment problem
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # even though agent is running successfully. In order to avoid the UI
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # failure the simple thing for now is to wait for a bit until fork is done,
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # later when waagent has better logic to handle a status it should be
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    # removed.
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    sleep 7s
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: }
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: GLIBC_MINVERSION="2.11"
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: + GLIBC_MINVERSION=2.11
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: GLIBC_MINVERSION_MAJOR=2
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: + GLIBC_MINVERSION_MAJOR=2
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: GLIBC_MINVERSION_MINOR=11
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: + GLIBC_MINVERSION_MINOR=11
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: is_version_supported()
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: {
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    curversion=$1
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    if [ "$curversion" = "$GLIBC_MINVERSION" ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        return 1
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    fi
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    local hasdot=0
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    local delim=.
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    case $curversion in
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        *$delim*) hasdot=1;;
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        *) hasdot=0;;
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    esac
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:    if [ $hasdot -eq 1 ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        firstval=`echo $curversion | cut -d "." -f 1`
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:            return 1
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:            return 0
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]:        e
Oct 25 09:02:07 vmfsppjb006 dracut[2016]: Skipping udev rule: 91-permissions.rules
Oct 25 09:02:07 vmfsppjb006 dracut[2016]: Skipping udev rule: 80-drivers-modprobe.rules
Oct 25 09:02:07 vmfsppjb006 dracut[2016]: *** Including module: dracut-systemd ***
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:07.946178Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Target handler state: enabled [incarnation 1]
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:07.948669Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] [Enable] current handler state is: enabled
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:07.948799Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Extension has no settings, write empty 0.settings
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:07.962145Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Enable extension: [scripts/run_python.sh scripts/enableHandler.py 1>&2]
Oct 25 09:02:07 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:07.962622Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Executing command: /var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500/scripts/run_python.sh scripts/enableHandler.py 1>&2 with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "9.10.11.17500", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 25 09:02:08 vmfsppjb006 dracut[2016]: *** Including module: usrmount ***
Oct 25 09:02:08 vmfsppjb006 dracut[2016]: *** Including module: base ***
Oct 25 09:02:08 vmfsppjb006 dracut[2016]: *** Including module: fs-lib ***
Oct 25 09:02:09 vmfsppjb006 kernel: bluechannel: loading out-of-tree module taints kernel.
Oct 25 09:02:09 vmfsppjb006 kernel: bluechannel: module license 'Proprietary' taints kernel.
Oct 25 09:02:09 vmfsppjb006 kernel: Disabling lock debugging due to kernel taint
Oct 25 09:02:09 vmfsppjb006 kernel: bluechannel: module verification failed: signature and/or required key missing - tainting kernel
Oct 25 09:02:09 vmfsppjb006 kernel: bluechannel: driver loading ver=9.10.11 rev=17500
Oct 25 09:02:09 vmfsppjb006 dracut[2016]: *** Including module: kdumpbase ***
Oct 25 09:02:09 vmfsppjb006 kernel: msda: driver loading ver=9.10.11 rev=17500
Oct 25 09:02:09 vmfsppjb006 kernel: msda: ipv6 support is active
Oct 25 09:02:09 vmfsppjb006 kernel: msda: bluechannel_link @000000005ad166ce
Oct 25 09:02:09 vmfsppjb006 kernel: msda: bluechannel_broadcast_heartbeat @0000000029cfd4a7
Oct 25 09:02:09 vmfsppjb006 kernel: sock_create v4 socket
Oct 25 09:02:09 vmfsppjb006 kernel: Supertramp allocated at 000000007f63330d
Oct 25 09:02:09 vmfsppjb006 kernel: msda: device registered at 10.56
Oct 25 09:02:09 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:09.969559Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Command: scripts/run_python.sh scripts/enableHandler.py 1>&2
Oct 25 09:02:09 vmfsppjb006 python3.6[1639]: [stdout]
Oct 25 09:02:09 vmfsppjb006 python3.6[1639]: [stderr]
Oct 25 09:02:09 vmfsppjb006 python3.6[1639]: Microsoft Dependency Agent service started.
Oct 25 09:02:10 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:10.010904Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Target handler state: enabled [incarnation 1]
Oct 25 09:02:10 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:10.011631Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] [Enable] current handler state is: enabled
Oct 25 09:02:10 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:10.011749Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Update settings file: 0.settings
Oct 25 09:02:10 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:10.012066Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Requested extension state: enabled
Oct 25 09:02:10 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:10.012589Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable extension: [omsagent_shim.sh -enable]
Oct 25 09:02:10 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:10.012954Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Executing command: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/omsagent_shim.sh -enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.13.40", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 25 09:02:10 vmfsppjb006 dracut[2016]: *** Including module: microcode_ctl-fw_dir_override ***
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:  microcode_ctl module: mangling fw_dir
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware"
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel"...
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:      microcode_ctl: intel: caveats check for kernel version "4.18.0-193.47.1.el8_2.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel" to fw_dir variable
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"...
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: configuration "intel-06-2d-07" is ignored
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"...
Oct 25 09:02:10 vmfsppjb006 kernel: msda: set_shm_size=0x800000
Oct 25 09:02:10 vmfsppjb006 kernel: msda: attaching hooks
Oct 25 09:02:10 vmfsppjb006 kernel: shm_area: initialized
Oct 25 09:02:10 vmfsppjb006 kernel: msda: invoking bluechannel_link: LINK {handle_bluechannel_event=0000000049b9dcdf}
Oct 25 09:02:10 vmfsppjb006 kernel: bluechannel: transition to LINKED
Oct 25 09:02:10 vmfsppjb006 kernel: msda: starting extants
Oct 25 09:02:10 vmfsppjb006 kernel: msda: extants complete
Oct 25 09:02:10 vmfsppjb006 kernel: msda: mmap requested size=8388608 area_size=8388608
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: configuration "intel-06-4e-03" is ignored
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"...
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: configuration "intel-06-4f-01" is ignored
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"...
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: configuration "intel-06-55-04" is ignored
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"...
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: configuration "intel-06-5e-03" is ignored
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"...
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: configuration "intel-06-8c-01" is ignored
Oct 25 09:02:10 vmfsppjb006 dracut[2016]:    microcode_ctl: final fw_dir: "/usr/share/microcode_ctl/ucode_with_caveats/intel /lib/firmware/updates /lib/firmware"
Oct 25 09:02:10 vmfsppjb006 dracut[2016]: *** Including module: shutdown ***
Oct 25 09:02:11 vmfsppjb006 dracut[2016]: *** Including module: squash ***
Oct 25 09:02:11 vmfsppjb006 dracut[2016]: *** Including modules done ***
Oct 25 09:02:11 vmfsppjb006 dracut[2016]: *** Installing kernel module dependencies ***
Oct 25 09:02:15 vmfsppjb006 dracut[2016]: *** Installing kernel module dependencies done ***
Oct 25 09:02:16 vmfsppjb006 dracut[2016]: *** Resolving executable dependencies ***
Oct 25 09:02:19 vmfsppjb006 dracut[2016]: *** Resolving executable dependencies done***
Oct 25 09:02:19 vmfsppjb006 dracut[2016]: *** Hardlinking files ***
Oct 25 09:02:19 vmfsppjb006 dracut[2016]: *** Hardlinking files done ***
Oct 25 09:02:19 vmfsppjb006 dracut[2016]: *** Stripping files ***
Oct 25 09:02:20 vmfsppjb006 dracut[2016]: *** Stripping files done ***
Oct 25 09:02:20 vmfsppjb006 dracut[2016]: *** Generating early-microcode cpio image ***
Oct 25 09:02:20 vmfsppjb006 dracut[2016]: *** Constructing GenuineIntel.bin ****
Oct 25 09:02:20 vmfsppjb006 dracut[2016]: *** Store current command line parameters ***
Oct 25 09:02:20 vmfsppjb006 dracut[2016]: Stored kernel commandline:
Oct 25 09:02:20 vmfsppjb006 dracut[2016]: rd.lvm.lv=rootvg/varlv
Oct 25 09:02:20 vmfsppjb006 dracut[2016]: *** Creating image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' ***
Oct 25 09:02:22 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 25 09:02:24 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 25 09:02:24 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 25 09:02:25 vmfsppjb006 systemd[1]: Started MySQL Server.
Oct 25 09:02:25 vmfsppjb006 systemd[1]: Starting Zabbix Server...
Oct 25 09:02:25 vmfsppjb006 systemd[1]: Starting Jobarranger Monitor...
Oct 25 09:02:25 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 25 09:02:26 vmfsppjb006 kernel: hv_balloon: Max. dynamic memory size: 2048 MB
Oct 25 09:02:26 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 25 09:02:26 vmfsppjb006 systemd[1]: jobarg-monitor.service: Can't open PID file /run/jobarranger/jobarg_monitor.pid (yet?) after start: No such file or directory
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 25 09:02:26 vmfsppjb006 journal[6436]: Job Arranger Monitor[6436]: Starting Job Arranger monitor. Job Arranger 5.0.1 (revision 7557).
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Started Jobarranger Monitor.
Oct 25 09:02:26 vmfsppjb006 journal[6437]: Job Arranger Monitor[6437]: jobarg_monitor #0 started [monitor]
Oct 25 09:02:26 vmfsppjb006 systemd[1]: zabbix-server.service: Can't open PID file /run/zabbix/zabbix_server.pid (yet?) after start: No such file or directory
Oct 25 09:02:26 vmfsppjb006 journal[6434]: Job Arranger Server[6434]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 25 09:02:26 vmfsppjb006 journal[6434]: Job Arranger Server[6434]: [JASERVER000003] server #0 started [main process]
Oct 25 09:02:26 vmfsppjb006 journal[6441]: Job Arranger Server[6441]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 25 09:02:26 vmfsppjb006 journal[6442]: Job Arranger Server[6442]: [JASERVER000004] server #2 started [start the job #1]
Oct 25 09:02:26 vmfsppjb006 journal[6443]: Job Arranger Server[6443]: [JASERVER000004] server #3 started [check the running job #1]
Oct 25 09:02:26 vmfsppjb006 journal[6444]: Job Arranger Server[6444]: [JASERVER000004] server #4 started [job trapper #1]
Oct 25 09:02:26 vmfsppjb006 journal[6445]: Job Arranger Server[6445]: [JASERVER000004] server #5 started [job trapper #2]
Oct 25 09:02:26 vmfsppjb006 journal[6446]: Job Arranger Server[6446]: [JASERVER000004] server #6 started [job trapper #3]
Oct 25 09:02:26 vmfsppjb006 journal[6447]: Job Arranger Server[6447]: [JASERVER000004] server #7 started [job trapper #4]
Oct 25 09:02:26 vmfsppjb006 journal[6448]: Job Arranger Server[6448]: [JASERVER000004] server #8 started [job trapper #5]
Oct 25 09:02:26 vmfsppjb006 journal[6449]: Job Arranger Server[6449]: [JASERVER000004] server #9 started [job loader #1]
Oct 25 09:02:26 vmfsppjb006 journal[6450]: Job Arranger Server[6450]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 25 09:02:26 vmfsppjb006 journal[6451]: Job Arranger Server[6451]: [JASERVER000004] server #11 started [message send #1]
Oct 25 09:02:26 vmfsppjb006 journal[6452]: Job Arranger Server[6452]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Started Zabbix Server.
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Reached target Multi-User System.
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Starting Update UTMP about System Runlevel Changes...
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Starting Azure temporary resource disk dataloss warning file creation...
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Reached target Cloud-init target.
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Started Update UTMP about System Runlevel Changes.
Oct 25 09:02:26 vmfsppjb006 temp-disk-dataloss-warning[6461]: Creating a dataloss warning file at /mnt/DATALOSS_WARNING_README.txt
Oct 25 09:02:26 vmfsppjb006 systemd[1]: Started Azure temporary resource disk dataloss warning file creation.
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:27.070195Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Command: omsagent_shim.sh -enable
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: [stdout]
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: 2021/10/25 09:02:25 [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable,success,0,Enable succeeded
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: [stderr]
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:27.072976Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState completed [Incarnation: 1; 28307 ms; Activity Id: 4fccc13b-8332-46a6-b65f-a0a4a419db7c; Correlation Id: fe7a5bdc-6b78-4387-9989-4edaa6ac25d5; GS Creation Time: 2021-10-25T00:00:54.478706Z]
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:27.148308Z INFO ExtHandler ExtHandler Extension status: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:27.148806Z INFO ExtHandler ExtHandler All extensions in the goal state have reached a terminal state: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:27.149215Z INFO ExtHandler ExtHandler Looking for existing remote access users.
Oct 25 09:02:27 vmfsppjb006 sssd[nss][937]: Enumeration requested but not enabled
Oct 25 09:02:27 vmfsppjb006 python3.6[1639]: 2021-10-25T00:02:27.225132Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 09:02:29 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:02:30 vmfsppjb006 dbus-daemon[6490]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:02:35 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:02:38 vmfsppjb006 dracut[2016]: *** Creating initramfs image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' done ***
Oct 25 09:02:39 vmfsppjb006 setroubleshoot[6490]: SELinux is preventing zabbix_server from using the dac_override capability. For complete SELinux messages run: sealert -l a6656240-7d68-4406-88d9-8f8364246780
Oct 25 09:02:39 vmfsppjb006 platform-python[6490]: SELinux is preventing zabbix_server from using the dac_override capability.#012#012*****  Plugin dac_override (91.4 confidence) suggests   **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012*****  Plugin catchall (9.59 confidence) suggests   **************************#012#012If you believe that zabbix_server should have the dac_override capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:02:41 vmfsppjb006 kdumpctl[1636]: kexec: loaded kdump kernel
Oct 25 09:02:41 vmfsppjb006 kdumpctl[1636]: Starting kdump: [OK]
Oct 25 09:02:41 vmfsppjb006 systemd[1]: Started Crash recovery kernel arming.
Oct 25 09:02:41 vmfsppjb006 systemd[1]: Startup finished in 1.395s (kernel) + 9.649s (initrd) + 1min 8.640s (userspace) = 1min 19.685s.
Oct 25 09:02:41 vmfsppjb006 setroubleshoot[6490]: failed to retrieve rpm info for /run/zabbix/zabbix_server_alerter.sock
Oct 25 09:02:41 vmfsppjb006 setroubleshoot[6490]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_alerter.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:02:41 vmfsppjb006 platform-python[6490]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_alerter.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_alerter.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:04:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:04:37 vmfsppjb006 dbus-daemon[6796]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:04:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:04:38 vmfsppjb006 setroubleshoot[6796]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:04:38 vmfsppjb006 setroubleshoot[6796]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:04:38 vmfsppjb006 platform-python[6796]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 09:09:01 vmfsppjb006 systemd[1]: Created slice system-user\x2druntime\x2ddir.slice.
Oct 25 09:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 09:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 09:09:01 vmfsppjb006 systemd[1]: Started Session 1 of user omsagent.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Reached target Paths.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Reached target Timers.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Starting D-Bus User Message Bus Socket.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Listening on D-Bus User Message Bus Socket.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Reached target Sockets.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Reached target Basic System.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Reached target Default.
Oct 25 09:09:01 vmfsppjb006 systemd[7048]: Startup finished in 150ms.
Oct 25 09:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Stopped target Default.
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Stopped target Basic System.
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Stopped target Paths.
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Stopped target Sockets.
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Closed D-Bus User Message Bus Socket.
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Reached target Shutdown.
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Starting Exit the Session...
Oct 25 09:09:09 vmfsppjb006 systemd[7048]: Stopped target Timers.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: user@986.service: Killing process 7183 (systemctl) with signal SIGKILL.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 09:09:09 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 09:09:09 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 09:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:09:37 vmfsppjb006 dbus-daemon[7214]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:09:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:09:37 vmfsppjb006 setroubleshoot[7214]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:09:38 vmfsppjb006 setroubleshoot[7214]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:09:38 vmfsppjb006 platform-python[7214]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:10:29 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:10:29 vmfsppjb006 dbus-daemon[7285]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:10:29 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:10:29 vmfsppjb006 setroubleshoot[7285]: failed to retrieve rpm info for /run/zabbix/zabbix_server_preprocessing.sock
Oct 25 09:10:30 vmfsppjb006 setroubleshoot[7285]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:10:30 vmfsppjb006 platform-python[7285]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_preprocessing.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:11:25 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 09:11:31 vmfsppjb006 dnf[7336]: packages-microsoft-com-prod                      13 kB/s | 3.0 kB     00:00
Oct 25 09:11:32 vmfsppjb006 dnf[7336]: MySQL 8.0 Community Server                       69 kB/s | 2.6 kB     00:00
Oct 25 09:11:32 vmfsppjb006 dnf[7336]: MySQL Connectors Community                       66 kB/s | 2.6 kB     00:00
Oct 25 09:11:32 vmfsppjb006 dnf[7336]: MySQL Tools Community                           344 kB/s | 2.6 kB     00:00
Oct 25 09:11:33 vmfsppjb006 dnf[7336]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.2 kB/s | 2.4 kB     00:00
Oct 25 09:11:35 vmfsppjb006 dnf[7336]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS   13 MB/s |  33 MB     00:02
Oct 25 09:11:42 vmfsppjb006 dnf[7336]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.5 kB/s | 2.8 kB     00:00
Oct 25 09:11:45 vmfsppjb006 dnf[7336]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 6.8 MB/s |  22 MB     00:03
Oct 25 09:11:50 vmfsppjb006 dnf[7336]: Microsoft Azure RPMs for RHEL8 Extended Update  6.3 kB/s | 2.1 kB     00:00
Oct 25 09:11:51 vmfsppjb006 dnf[7336]: Zabbix Official Repository - x86_64             8.3 kB/s | 2.9 kB     00:00
Oct 25 09:11:51 vmfsppjb006 dnf[7336]: Zabbix Official Repository non-supported - x86_  12 kB/s | 3.0 kB     00:00
Oct 25 09:11:53 vmfsppjb006 dnf[7336]: Metadata cache created.
Oct 25 09:11:53 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 09:15:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:15:37 vmfsppjb006 dbus-daemon[7606]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:15:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:15:38 vmfsppjb006 setroubleshoot[7606]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:15:38 vmfsppjb006 setroubleshoot[7606]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:15:38 vmfsppjb006 platform-python[7606]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:16:25 vmfsppjb006 systemd[1]: Starting Cleanup of Temporary Directories...
Oct 25 09:16:25 vmfsppjb006 systemd-tmpfiles[7653]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 25 09:16:25 vmfsppjb006 systemd-tmpfiles[7653]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 25 09:16:25 vmfsppjb006 systemd[1]: Started Cleanup of Temporary Directories.
Oct 25 09:16:55 vmfsppjb006 python3.6[1639]: 2021-10-25T00:16:55.418438Z INFO Daemon Agent WALinuxAgent-2.5.0.2 launched with command '/usr/bin/python3.6 -u bin/WALinuxAgent-2.5.0.2-py2.7.egg -run-exthandlers' is successfully running
Oct 25 09:18:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:18:37 vmfsppjb006 dbus-daemon[7777]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:18:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:18:38 vmfsppjb006 setroubleshoot[7777]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:18:38 vmfsppjb006 setroubleshoot[7777]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:18:38 vmfsppjb006 platform-python[7777]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:19:15 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1000.
Oct 25 09:19:15 vmfsppjb006 systemd[1]: Started /run/user/1000 mount wrapper.
Oct 25 09:19:15 vmfsppjb006 systemd[1]: Starting User Manager for UID 1000...
Oct 25 09:19:15 vmfsppjb006 systemd[1]: Started Session 3 of user finsrvpf.
Oct 25 09:19:15 vmfsppjb006 systemd-logind[943]: New session 3 of user finsrvpf.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Reached target Paths.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Reached target Timers.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Starting D-Bus User Message Bus Socket.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Listening on D-Bus User Message Bus Socket.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Reached target Sockets.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Reached target Basic System.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Reached target Default.
Oct 25 09:19:15 vmfsppjb006 systemd[7816]: Startup finished in 52ms.
Oct 25 09:19:15 vmfsppjb006 systemd[1]: Started User Manager for UID 1000.
Oct 25 09:19:30 vmfsppjb006 su[7864]: (to root) finsrvpf on pts/0
Oct 25 09:19:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:19:37 vmfsppjb006 dbus-daemon[7907]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:19:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:19:38 vmfsppjb006 setroubleshoot[7907]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:19:38 vmfsppjb006 setroubleshoot[7907]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:19:38 vmfsppjb006 platform-python[7907]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:21:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:21:37 vmfsppjb006 dbus-daemon[8026]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:21:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:21:38 vmfsppjb006 setroubleshoot[8026]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:21:38 vmfsppjb006 setroubleshoot[8026]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:21:38 vmfsppjb006 platform-python[8026]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:21:56 vmfsppjb006 systemd[7816]: Starting Mark boot as successful...
Oct 25 09:21:56 vmfsppjb006 systemd[7816]: Started Mark boot as successful.
Oct 25 09:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 09:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 09:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 09:24:01 vmfsppjb006 systemd[1]: Started Session 5 of user omsagent.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Reached target Paths.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Reached target Timers.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Starting D-Bus User Message Bus Socket.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Listening on D-Bus User Message Bus Socket.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Reached target Sockets.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Reached target Basic System.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Reached target Default.
Oct 25 09:24:01 vmfsppjb006 systemd[8183]: Startup finished in 46ms.
Oct 25 09:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 09:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Stopped target Default.
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Stopped target Basic System.
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Stopped target Timers.
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Stopped target Sockets.
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Closed D-Bus User Message Bus Socket.
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Stopped target Paths.
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Reached target Shutdown.
Oct 25 09:24:04 vmfsppjb006 systemd[8183]: Starting Exit the Session...
Oct 25 09:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 8312 (systemctl) with signal SIGKILL.
Oct 25 09:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 09:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 09:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 09:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 09:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:24:37 vmfsppjb006 dbus-daemon[8352]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:24:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:24:38 vmfsppjb006 setroubleshoot[8352]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:24:38 vmfsppjb006 setroubleshoot[8352]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:24:38 vmfsppjb006 platform-python[8352]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:25:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:25:37 vmfsppjb006 dbus-daemon[8413]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:25:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:25:38 vmfsppjb006 setroubleshoot[8413]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:25:38 vmfsppjb006 setroubleshoot[8413]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:25:38 vmfsppjb006 platform-python[8413]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:32:26 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 09:32:26 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 09:32:26 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 09:32:26 vmfsppjb006 systemd[1]: Started Session c1 of user root.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Reached target Paths.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Reached target Timers.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Starting D-Bus User Message Bus Socket.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Listening on D-Bus User Message Bus Socket.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Reached target Sockets.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Reached target Basic System.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Reached target Default.
Oct 25 09:32:26 vmfsppjb006 systemd[8878]: Startup finished in 45ms.
Oct 25 09:32:26 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 09:32:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 09:32:27 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Stopped target Default.
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Stopped target Basic System.
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Stopped target Sockets.
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Closed D-Bus User Message Bus Socket.
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Stopped target Timers.
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Stopped target Paths.
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Reached target Shutdown.
Oct 25 09:32:27 vmfsppjb006 systemd[8878]: Starting Exit the Session...
Oct 25 09:32:27 vmfsppjb006 systemd[1]: user@0.service: Killing process 8914 (systemctl) with signal SIGKILL.
Oct 25 09:32:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 09:32:27 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 09:32:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 09:32:27 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 09:32:27 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 09:32:27 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 09:32:28 vmfsppjb006 python3.6[1639]: 2021-10-25T00:32:28.028425Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 1;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 09:32:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:32:37 vmfsppjb006 dbus-daemon[8950]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:32:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:32:38 vmfsppjb006 setroubleshoot[8950]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:32:38 vmfsppjb006 setroubleshoot[8950]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:32:38 vmfsppjb006 platform-python[8950]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:35:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:35:37 vmfsppjb006 dbus-daemon[9120]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:35:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:35:38 vmfsppjb006 setroubleshoot[9120]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:35:38 vmfsppjb006 setroubleshoot[9120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:35:38 vmfsppjb006 platform-python[9120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 09:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 09:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 09:39:01 vmfsppjb006 systemd[1]: Started Session 8 of user omsagent.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Reached target Paths.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Starting D-Bus User Message Bus Socket.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Reached target Timers.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Listening on D-Bus User Message Bus Socket.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Reached target Sockets.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Reached target Basic System.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Reached target Default.
Oct 25 09:39:01 vmfsppjb006 systemd[9318]: Startup finished in 45ms.
Oct 25 09:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Stopped target Default.
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Stopped target Basic System.
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Stopped target Paths.
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Stopped target Sockets.
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Closed D-Bus User Message Bus Socket.
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Reached target Shutdown.
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Starting Exit the Session...
Oct 25 09:39:03 vmfsppjb006 systemd[9318]: Stopped target Timers.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 9438 (systemctl) with signal SIGKILL.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 09:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 09:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 09:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:39:37 vmfsppjb006 dbus-daemon[9478]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:39:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:39:38 vmfsppjb006 setroubleshoot[9478]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:39:38 vmfsppjb006 setroubleshoot[9478]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:39:38 vmfsppjb006 platform-python[9478]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:42:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:42:37 vmfsppjb006 dbus-daemon[9655]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:42:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:42:38 vmfsppjb006 setroubleshoot[9655]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:42:39 vmfsppjb006 setroubleshoot[9655]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:42:39 vmfsppjb006 platform-python[9655]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 09:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 09:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 09:54:01 vmfsppjb006 systemd[1]: Started Session 10 of user omsagent.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Reached target Paths.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Starting D-Bus User Message Bus Socket.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Reached target Timers.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Listening on D-Bus User Message Bus Socket.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Reached target Sockets.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Reached target Basic System.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Reached target Default.
Oct 25 09:54:01 vmfsppjb006 systemd[10301]: Startup finished in 46ms.
Oct 25 09:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 09:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:54:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Stopped target Default.
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Stopped target Basic System.
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Stopped target Timers.
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Stopped target Sockets.
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Closed D-Bus User Message Bus Socket.
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Stopped target Paths.
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Reached target Shutdown.
Oct 25 09:54:04 vmfsppjb006 systemd[10301]: Starting Exit the Session...
Oct 25 09:54:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 10420 (systemctl) with signal SIGKILL.
Oct 25 09:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:54:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 09:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 09:54:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 09:54:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 09:54:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 09:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:54:37 vmfsppjb006 dbus-daemon[10460]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:54:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:54:38 vmfsppjb006 setroubleshoot[10460]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:54:39 vmfsppjb006 setroubleshoot[10460]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:54:39 vmfsppjb006 platform-python[10460]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 09:55:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 09:55:37 vmfsppjb006 dbus-daemon[10534]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 09:55:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 09:55:38 vmfsppjb006 setroubleshoot[10534]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 09:55:39 vmfsppjb006 setroubleshoot[10534]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 09:55:39 vmfsppjb006 platform-python[10534]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:01:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:01:37 vmfsppjb006 dbus-daemon[10889]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:01:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:01:38 vmfsppjb006 setroubleshoot[10889]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:01:39 vmfsppjb006 setroubleshoot[10889]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:01:39 vmfsppjb006 platform-python[10889]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:01:59 vmfsppjb006 python3.6[1639]: 2021-10-25T01:01:59.001258Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 10:02:28 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 10:02:28 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 10:02:28 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 10:02:28 vmfsppjb006 systemd[1]: Started Session c2 of user root.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Reached target Timers.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Starting D-Bus User Message Bus Socket.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Reached target Paths.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Listening on D-Bus User Message Bus Socket.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Reached target Sockets.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Reached target Basic System.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Reached target Default.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Startup finished in 48ms.
Oct 25 10:02:29 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 10:02:29 vmfsppjb006 python3.6[1639]: 2021-10-25T01:02:29.118616Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 2;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 10:02:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 10:02:29 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Stopped target Default.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Stopped target Basic System.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Stopped target Sockets.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Closed D-Bus User Message Bus Socket.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Stopped target Timers.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Stopped target Paths.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Reached target Shutdown.
Oct 25 10:02:29 vmfsppjb006 systemd[11022]: Starting Exit the Session...
Oct 25 10:02:29 vmfsppjb006 systemd[1]: user@0.service: Killing process 11058 (systemctl) with signal SIGKILL.
Oct 25 10:02:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 10:02:29 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 10:02:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 10:02:29 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 10:02:29 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 10:02:29 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 10:02:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:02:37 vmfsppjb006 dbus-daemon[11091]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:02:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:02:38 vmfsppjb006 setroubleshoot[11091]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:02:39 vmfsppjb006 setroubleshoot[11091]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:02:39 vmfsppjb006 platform-python[11091]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:03:37 vmfsppjb006 dbus-daemon[11155]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:03:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:03:38 vmfsppjb006 setroubleshoot[11155]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:03:39 vmfsppjb006 setroubleshoot[11155]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:03:39 vmfsppjb006 platform-python[11155]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 10:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 10:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 10:09:01 vmfsppjb006 systemd[1]: Started Session 13 of user omsagent.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Reached target Paths.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Reached target Timers.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Starting D-Bus User Message Bus Socket.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Listening on D-Bus User Message Bus Socket.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Reached target Sockets.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Reached target Basic System.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Reached target Default.
Oct 25 10:09:01 vmfsppjb006 systemd[11462]: Startup finished in 47ms.
Oct 25 10:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Stopped target Default.
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Stopped target Basic System.
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Stopped target Sockets.
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Closed D-Bus User Message Bus Socket.
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Stopped target Paths.
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Reached target Shutdown.
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Starting Exit the Session...
Oct 25 10:09:03 vmfsppjb006 systemd[11462]: Stopped target Timers.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 11583 (systemctl) with signal SIGKILL.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 10:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 10:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 10:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:09:37 vmfsppjb006 dbus-daemon[11624]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:09:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:09:38 vmfsppjb006 setroubleshoot[11624]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:09:39 vmfsppjb006 setroubleshoot[11624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:09:39 vmfsppjb006 platform-python[11624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:10:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:10:37 vmfsppjb006 dbus-daemon[11696]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:10:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:10:38 vmfsppjb006 setroubleshoot[11696]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:10:39 vmfsppjb006 setroubleshoot[11696]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:10:39 vmfsppjb006 platform-python[11696]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:11:56 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 10:11:57 vmfsppjb006 dnf[11772]: Metadata cache refreshed recently.
Oct 25 10:11:57 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 10:12:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:12:37 vmfsppjb006 dbus-daemon[11816]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:12:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:12:38 vmfsppjb006 setroubleshoot[11816]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:12:39 vmfsppjb006 setroubleshoot[11816]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:12:39 vmfsppjb006 platform-python[11816]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 10:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 10:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 10:24:01 vmfsppjb006 systemd[1]: Started Session 15 of user omsagent.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Reached target Paths.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Starting D-Bus User Message Bus Socket.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Reached target Timers.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Listening on D-Bus User Message Bus Socket.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Reached target Sockets.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Reached target Basic System.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Reached target Default.
Oct 25 10:24:01 vmfsppjb006 systemd[12477]: Startup finished in 46ms.
Oct 25 10:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 10:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Stopped target Default.
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Stopped target Basic System.
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Stopped target Paths.
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Stopped target Sockets.
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Closed D-Bus User Message Bus Socket.
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Reached target Shutdown.
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Stopped target Timers.
Oct 25 10:24:04 vmfsppjb006 systemd[12477]: Starting Exit the Session...
Oct 25 10:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 12598 (systemctl) with signal SIGKILL.
Oct 25 10:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 10:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 10:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 10:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 10:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:24:37 vmfsppjb006 dbus-daemon[12637]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:24:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:24:37 vmfsppjb006 setroubleshoot[12637]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:24:38 vmfsppjb006 setroubleshoot[12637]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:24:38 vmfsppjb006 platform-python[12637]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:25:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:25:37 vmfsppjb006 dbus-daemon[12709]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:25:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:25:37 vmfsppjb006 setroubleshoot[12709]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:25:38 vmfsppjb006 setroubleshoot[12709]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:25:38 vmfsppjb006 platform-python[12709]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:27:01 vmfsppjb006 logrotate[12795]: ALERT exited abnormally with [1]
Oct 25 10:27:02 vmfsppjb006 rhsmd[12805]: In order for Subscription Manager to provide your system with updates, your system must be registered with the Customer Portal. Please enter your Red Hat login to ensure your system is up-to-date.
Oct 25 10:27:04 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:27:04 vmfsppjb006 dbus-daemon[12822]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:27:04 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:27:05 vmfsppjb006 setroubleshoot[12822]: failed to retrieve rpm info for /var/opt/microsoft/omsconfig/omsconfig.log
Oct 25 10:27:08 vmfsppjb006 setroubleshoot[12822]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log. For complete SELinux messages run: sealert -l 032b50b8-a43a-405d-88e8-f8bba97fe952
Oct 25 10:27:08 vmfsppjb006 platform-python[12822]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log.#012#012*****  Plugin restorecon (94.8 confidence) suggests   ************************#012#012If you want to fix the label. #012/var/opt/microsoft/omsconfig/omsconfig.log default label should be var_log_t.#012Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly.#012Do#012# /sbin/restorecon -v /var/opt/microsoft/omsconfig/omsconfig.log#012#012*****  Plugin catchall_labels (5.21 confidence) suggests   *******************#012#012If you want to allow logrotate to have getattr access on the omsconfig.log file#012Then you need to change the label on /var/opt/microsoft/omsconfig/omsconfig.log#012Do#012# semanage fcontext -a -t FILE_TYPE '/var/opt/microsoft/omsconfig/omsconfig.log'#012where FILE_TYPE is one of the following: NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_log_t, NetworkManager_tmp_t, NetworkManager_unit_file_t, NetworkManager_var_run_t, abrt_dump_oops_exec_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_worker_exec_t, abrt_tmp_t, abrt_unit_file_t, abrt_upload_watch_exec_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_log_t, abrt_var_run_t, abrt_watch_log_exec_t, accountsd_exec_t, accountsd_unit_file_t, acct_data_t, acct_exec_t, acct_initrc_exec_t, admin_crontab_tmp_t, admin_passwd_exec_t, afs_bosserver_exec_t, afs_exec_t, afs_fsserver_exec_t, afs_initrc_exec_t, afs_kaserver_exec_t, afs_logfile_t, afs_ptserver_exec_t, afs_vlserver_exec_t, aiccu_exec_t, aiccu_initrc_exec_t, aiccu_var_run_t, aide_exec_t, aide_log_t, ajaxterm_exec_t, ajaxterm_initrc_exec_t, ajaxterm_var_run_t, alsa_exec_t, alsa_tmp_t, alsa_unit_file_t, alsa_var_run_t, amanda_exec_t, amanda_inetd_exec_t, amanda_log_t, amanda_recover_exec_t, amanda_tmp_t, amanda_unit_file_t, amtu_exec_t, amtu_initrc_exec_t, anaconda_exec_t, anacron_exec_t, anon_inodefs_t, antivirus_exec_t, antivirus_initrc_exec_t, antivirus_log_t, antivirus_tmp_t, antivirus_unit_file_t, antivirus_var_run_t, apcupsd_cgi_script_exec_t, apcupsd_exec_t, apcupsd_initrc_exec_t, apcupsd_log_t, apcupsd_tmp_t, apcupsd_unit_file_t, apcupsd_var_run_t, apm_exec_t, apmd_exec_t, apmd_initrc_exec_t, apmd_log_t, apmd_tmp_t, apmd_unit_file_t, apmd_var_run_t, arpwatch_exec_t, arpwatch_initrc_exec_t, arpwatch_tmp_t, arpwatch_unit_file_t, arpwatch_var_run_t, asterisk_exec_t, asterisk_initrc_exec_t, asterisk_log_t, asterisk_tmp_t, asterisk_var_run_t, audisp_exec_t, audisp_remote_exec_t, audisp_var_run_t, auditadm_sudo_tmp_t, auditctl_exec_t, auditd_exec_t, auditd_initrc_exec_t, auditd_log_t, auditd_tmp_t, auditd_unit_file_t, auditd_var_run_t, auoms_exec_t, auth_cache_t, authconfig_exec_t, automount_exec_t, automount_initrc_exec_t, automount_tmp_t, automount_unit_file_t, automount_var_run_t, avahi_exec_t, avahi_initrc_exec_t, avahi_unit_file_t, avahi_var_run_t, awstats_exec_t, awstats_script_exec_t, awstats_tmp_t, bacula_admin_exec_t, bacula_exec_t, bacula_initrc_exec_t, bacula_log_t, bacula_tmp_t, bacula_unconfined_script_exec_t, bacula_var_run_t, bcfg2_exec_t, bcfg2_initrc_exec_t, bcfg2_unit_file_t, bcfg2_var_run_t, bin_t, bitlbee_exec_t, bitlbee_initrc_exec_t, bitlbee_log_t, bitlbee_tmp_t, bitlbee_var_run_t, blkmapd_exec_t, blkmapd_initrc_exec_t, blkmapd_var_run_t, blktap_exec_t, blktap_var_run_t, blueman_exec_t, blueman_tmp_t, blueman_var_run_t, bluetooth_exec_t, bluetooth_helper_exec_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_initrc_exec_t, bluetooth_tmp_t, bluetooth_unit_file_t, bluetooth_var_run_t, boinc_exec_t, boinc_initrc_exec_t, boinc_log_t, boinc_project_tmp_t, boinc_tmp_t, boinc_unit_file_t, boltd_exec_t, boltd_var_run_t, boot_t, bootloader_exec_t, bootloader_tmp_t, bootloader_var_run_t, brctl_exec_t, brltty_exec_t, brltty_log_t, brltty_unit_file_t, brltty_var_run_t, bugzilla_script_exec_t, bugzilla_tmp_t, bumblebee_exec_t, bumblebee_unit_file_t, bumblebee_var_run_t, cachefilesd_exec_t, cachefilesd_var_run_t, calamaris_exec_t, calamaris_log_t, callweaver_exec_t, callweaver_initrc_exec_t, callweaver_log_t, callweaver_var_run_t, canna_exec_t, canna_initrc_exec_t, canna_log_t, canna_var_run_t, cardctl_exec_t, cardmgr_dev_t, cardmgr_exec_t, cardmgr_var_run_t, ccs_exec_t, ccs_initrc_exec_t, ccs_tmp_t, ccs_var_lib_t, ccs_var_log_t, ccs_var_run_t, cdcc_exec_t, cdcc_tmp_t, cdrecord_exec_t, cert_t, certmaster_exec_t, certmaster_initrc_exec_t, certmaster_var_log_t, certmaster_var_run_t, certmonger_exec_t, certmonger_initrc_exec_t, certmonger_tmp_t, certmonger_unconfined_exec_t, certmonger_unit_file_t, certmonger_var_run_t, certwatch_exec_t, cfengine_execd_exec_t, cfengine_initrc_exec_t, cfengine_log_t, cfengine_monitord_exec_t, cfengine_serverd_exec_t, cgclear_exec_t, cgconfig_exec_t, cgconfig_initrc_exec_t, cgdcbxd_exec_t, cgdcbxd_unit_file_t, cgdcbxd_var_run_t, cgred_exec_t, cgred_initrc_exec_t, cgred_log_t, cgred_var_run_t, cgroup_t, checkpc_exec_t, checkpc_log_t, checkpolicy_exec_t, chfn_exec_t, chkpwd_exec_t, chrome_sandbox_exec_t, chrome_sandbox_nacl_exec_t, chrome_sandbox_tmp_t, chronyc_exec_t, chronyd_exec_t, chronyd_initrc_exec_t, chronyd_keys_t, chronyd_tmp_t, chronyd_unit_file_t, chronyd_var_log_t, chronyd_var_run_t, chroot_exec_t, cifs_t, cinder_api_exec_t, cinder_api_tmp_t, cinder_api_unit_file_t, cinder_backup_exec_t, cinder_backup_tmp_t, cinder_backup_unit_file_t, cinder_log_t, cinder_scheduler_exec_t, cinder_scheduler_tmp_t, cinder_scheduler_unit_file_t, cinder_var_run_t, cinder_volume_exec_t, cinder_volume_tmp_t, cinder_volume_unit_file_t, ciped_exec_t, ciped_initrc_exec_t, clogd_exec_t, clogd_var_run_t, cloud_init_exec_t, cloud_init_tmp_t, cloud_init_unit_file_t, cloud_log_t, cluster_conf_t, cluster_exec_t, cluster_initrc_exec_t, cluster_tmp_t, cluster_unit_file_t, cluster_var_lib_t, cluster_var_log_t, cluster_var_run_t, clvmd_exec_t, clvmd_initrc_exec_t, clvmd_var_run_t, cmirrord_exec_t, cmirrord_initrc_exec_t, cmirrord_var_run_t, cobbler_tmp_t, cobbler_var_log_t, cobblerd_exec_t, cobblerd_initrc_exec_t, cockpit_session_exec_t, cockpit_tmp_t, cockpit_tmpfs_t, cockpit_unit_file_t, cockpit_var_run_t, cockpit_ws_exec_t, collectd_exec_t, collectd_initrc_exec_t, collectd_log_t, collectd_script_exec_t, collectd_script_tmp_t, collectd_unit_file_t, collectd_var_run_t, colord_exec_t, colord_tmp_t, colord_unit_file_t, comsat_exec_t, comsat_tmp_t, comsat_var_run_t, condor_collector_exec_t, condor_initrc_exec_t, condor_log_t, condor_master_exec_t, condor_master_tmp_t, condor_negotiator_exec_t, condor_procd_exec_t, condor_schedd_exec_t, condor_schedd_tmp_t, condor_startd_exec_t, condor_startd_tmp_t, condor_unit_file_t, condor_var_run_t, conman_exec_t, conman_log_t, conman_tmp_t, conman_unconfined_script_exec_t, conman_unit_file_t, conman_var_run_t, conntrackd_exec_t, conntrackd_initrc_exec_t, conntrackd_log_t, conntrackd_unit_file_t, conntrackd_var_run_t, consolehelper_exec_t, consolekit_exec_t, consolekit_log_t, consolekit_unit_file_t, consolekit_var_run_t, couchdb_exec_t, couchdb_initrc_exec_t, couchdb_log_t, couchdb_tmp_t, couchdb_unit_file_t, couchdb_var_run_t, courier_authdaemon_exec_t, courier_exec_t, courier_pcp_exec_t, courier_pop_exec_t, courier_sqwebmail_exec_t, courier_tcpd_exec_t, courier_var_run_t, cpu_online_t, cpucontrol_exec_t, cpufreqselector_exec_t, cpuplug_exec_t, cpuplug_initrc_exec_t, cpuplug_var_run_t, cpuspeed_exec_t, cpuspeed_var_run_t, crack_exec_t, crack_tmp_t, cron_log_t, cron_var_run_t, crond_exec_t, crond_initrc_exec_t, crond_tmp_t, crond_unit_file_t, crond_var_run_t, crontab_exec_t, crontab_tmp_t, ctdbd_exec_t, ctdbd_initrc_exec_t, ctdbd_log_t, ctdbd_tmp_t, ctdbd_var_run_t, cups_pdf_exec_t, cups_pdf_tmp_t, cupsd_config_exec_t, cupsd_config_var_run_t, cupsd_exec_t, cupsd_initrc_exec_t, cupsd_log_t, cupsd_lpd_exec_t, cupsd_lpd_tmp_t, cupsd_lpd_var_run_t, cupsd_tmp_t, cupsd_unit_file_t, cupsd_var_run_t, cvs_exec_t, cvs_initrc
Oct 25 10:27:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:27:37 vmfsppjb006 dbus-daemon[12867]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:27:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:27:38 vmfsppjb006 setroubleshoot[12867]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:27:38 vmfsppjb006 setroubleshoot[12867]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:27:38 vmfsppjb006 platform-python[12867]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:32:29 vmfsppjb006 python3.6[1639]: 2021-10-25T01:32:29.801420Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 3;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 10:32:30 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 10:32:30 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 10:32:30 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 10:32:30 vmfsppjb006 systemd[1]: Started Session c3 of user root.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Reached target Paths.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Starting D-Bus User Message Bus Socket.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Reached target Timers.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Listening on D-Bus User Message Bus Socket.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Reached target Sockets.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Reached target Basic System.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Reached target Default.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Startup finished in 48ms.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Stopped target Default.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Stopped target Basic System.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Stopped target Paths.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Stopped target Sockets.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Closed D-Bus User Message Bus Socket.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Reached target Shutdown.
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Starting Exit the Session...
Oct 25 10:32:31 vmfsppjb006 systemd[13225]: Stopped target Timers.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: user@0.service: Killing process 13260 (systemctl) with signal SIGKILL.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 10:32:31 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 10:32:31 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 10:32:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:32:37 vmfsppjb006 dbus-daemon[13282]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:32:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:32:38 vmfsppjb006 setroubleshoot[13282]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:32:38 vmfsppjb006 setroubleshoot[13282]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:32:38 vmfsppjb006 platform-python[13282]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:35:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:35:37 vmfsppjb006 dbus-daemon[13461]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:35:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:35:38 vmfsppjb006 setroubleshoot[13461]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:35:38 vmfsppjb006 setroubleshoot[13461]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:35:38 vmfsppjb006 platform-python[13461]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 10:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 10:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 10:39:01 vmfsppjb006 systemd[1]: Started Session 18 of user omsagent.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Starting D-Bus User Message Bus Socket.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Reached target Timers.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Reached target Paths.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Listening on D-Bus User Message Bus Socket.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Reached target Sockets.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Reached target Basic System.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Reached target Default.
Oct 25 10:39:01 vmfsppjb006 systemd[13649]: Startup finished in 50ms.
Oct 25 10:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 10:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Stopped target Default.
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Stopped target Basic System.
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Stopped target Timers.
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Stopped target Paths.
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Stopped target Sockets.
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Closed D-Bus User Message Bus Socket.
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Reached target Shutdown.
Oct 25 10:39:03 vmfsppjb006 systemd[13649]: Starting Exit the Session...
Oct 25 10:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 13768 (systemctl) with signal SIGKILL.
Oct 25 10:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 10:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 10:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 10:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 10:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:39:37 vmfsppjb006 dbus-daemon[13820]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:39:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:39:38 vmfsppjb006 setroubleshoot[13820]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:39:38 vmfsppjb006 setroubleshoot[13820]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:39:38 vmfsppjb006 platform-python[13820]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:40:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:40:37 vmfsppjb006 dbus-daemon[13881]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:40:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:40:38 vmfsppjb006 setroubleshoot[13881]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:40:38 vmfsppjb006 setroubleshoot[13881]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:40:38 vmfsppjb006 platform-python[13881]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 10:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 10:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 10:54:01 vmfsppjb006 systemd[1]: Started Session 20 of user omsagent.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Reached target Paths.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Reached target Timers.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Starting D-Bus User Message Bus Socket.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Listening on D-Bus User Message Bus Socket.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Reached target Sockets.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Reached target Basic System.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Reached target Default.
Oct 25 10:54:01 vmfsppjb006 systemd[14638]: Startup finished in 49ms.
Oct 25 10:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 10:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Stopped target Default.
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Stopped target Basic System.
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Stopped target Timers.
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Stopped target Paths.
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Stopped target Sockets.
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Closed D-Bus User Message Bus Socket.
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Reached target Shutdown.
Oct 25 10:54:03 vmfsppjb006 systemd[14638]: Starting Exit the Session...
Oct 25 10:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 14758 (systemctl) with signal SIGKILL.
Oct 25 10:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 10:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 10:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 10:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 10:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 10:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:54:37 vmfsppjb006 dbus-daemon[14801]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:54:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:54:38 vmfsppjb006 setroubleshoot[14801]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:54:39 vmfsppjb006 setroubleshoot[14801]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:54:39 vmfsppjb006 platform-python[14801]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 10:55:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 10:55:37 vmfsppjb006 dbus-daemon[14872]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 10:55:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 10:55:38 vmfsppjb006 setroubleshoot[14872]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 10:55:39 vmfsppjb006 setroubleshoot[14872]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 10:55:39 vmfsppjb006 platform-python[14872]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:01:59 vmfsppjb006 python3.6[1639]: 2021-10-25T02:01:59.197750Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 11:02:32 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 11:02:32 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 11:02:32 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 11:02:32 vmfsppjb006 systemd[1]: Started Session c4 of user root.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Reached target Paths.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Starting D-Bus User Message Bus Socket.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Reached target Timers.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Listening on D-Bus User Message Bus Socket.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Reached target Sockets.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Reached target Basic System.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Reached target Default.
Oct 25 11:02:32 vmfsppjb006 systemd[15346]: Startup finished in 51ms.
Oct 25 11:02:32 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 11:02:33 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 11:02:33 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Stopped target Default.
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Stopped target Basic System.
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Stopped target Sockets.
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Closed D-Bus User Message Bus Socket.
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Stopped target Timers.
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Stopped target Paths.
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Reached target Shutdown.
Oct 25 11:02:33 vmfsppjb006 systemd[15346]: Starting Exit the Session...
Oct 25 11:02:33 vmfsppjb006 systemd[1]: user@0.service: Killing process 15381 (systemctl) with signal SIGKILL.
Oct 25 11:02:33 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 11:02:33 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 11:02:33 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 11:02:33 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 11:02:33 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 11:02:33 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 11:02:35 vmfsppjb006 python3.6[1639]: 2021-10-25T02:02:35.341003Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 4;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 11:02:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:02:37 vmfsppjb006 dbus-daemon[15415]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:02:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:02:38 vmfsppjb006 setroubleshoot[15415]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:02:39 vmfsppjb006 setroubleshoot[15415]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:02:39 vmfsppjb006 platform-python[15415]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:05:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:05:37 vmfsppjb006 dbus-daemon[15586]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:05:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:05:38 vmfsppjb006 setroubleshoot[15586]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:05:39 vmfsppjb006 setroubleshoot[15586]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:05:39 vmfsppjb006 platform-python[15586]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 11:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 11:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 11:09:01 vmfsppjb006 systemd[1]: Started Session 23 of user omsagent.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Starting D-Bus User Message Bus Socket.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Reached target Timers.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Reached target Paths.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Listening on D-Bus User Message Bus Socket.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Reached target Sockets.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Reached target Basic System.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Reached target Default.
Oct 25 11:09:01 vmfsppjb006 systemd[15783]: Startup finished in 46ms.
Oct 25 11:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 11:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Stopped target Default.
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Stopped target Basic System.
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Stopped target Timers.
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Stopped target Paths.
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Stopped target Sockets.
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Closed D-Bus User Message Bus Socket.
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Reached target Shutdown.
Oct 25 11:09:03 vmfsppjb006 systemd[15783]: Starting Exit the Session...
Oct 25 11:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 15902 (systemctl) with signal SIGKILL.
Oct 25 11:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 11:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 11:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 11:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 11:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:09:37 vmfsppjb006 dbus-daemon[15945]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:09:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:09:38 vmfsppjb006 setroubleshoot[15945]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:09:39 vmfsppjb006 setroubleshoot[15945]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:09:39 vmfsppjb006 platform-python[15945]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:10:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:10:37 vmfsppjb006 dbus-daemon[16017]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:10:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:10:38 vmfsppjb006 setroubleshoot[16017]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:10:39 vmfsppjb006 setroubleshoot[16017]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:10:39 vmfsppjb006 platform-python[16017]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:11:59 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 11:11:59 vmfsppjb006 dnf[16092]: Metadata cache refreshed recently.
Oct 25 11:11:59 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 11:16:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:16:37 vmfsppjb006 dbus-daemon[16356]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:16:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:16:38 vmfsppjb006 setroubleshoot[16356]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:16:39 vmfsppjb006 setroubleshoot[16356]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:16:39 vmfsppjb006 platform-python[16356]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 11:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 11:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 11:24:01 vmfsppjb006 systemd[1]: Started Session 25 of user omsagent.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Reached target Paths.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Starting D-Bus User Message Bus Socket.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Reached target Timers.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Listening on D-Bus User Message Bus Socket.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Reached target Sockets.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Reached target Basic System.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Reached target Default.
Oct 25 11:24:01 vmfsppjb006 systemd[16786]: Startup finished in 45ms.
Oct 25 11:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 11:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Stopped target Default.
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Stopped target Basic System.
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Stopped target Sockets.
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Closed D-Bus User Message Bus Socket.
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Stopped target Timers.
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Stopped target Paths.
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Reached target Shutdown.
Oct 25 11:24:03 vmfsppjb006 systemd[16786]: Starting Exit the Session...
Oct 25 11:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 16905 (systemctl) with signal SIGKILL.
Oct 25 11:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 11:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 11:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 11:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 11:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:24:37 vmfsppjb006 dbus-daemon[16946]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:24:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:24:38 vmfsppjb006 setroubleshoot[16946]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:24:39 vmfsppjb006 setroubleshoot[16946]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:24:39 vmfsppjb006 platform-python[16946]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:32:34 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 11:32:34 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 11:32:34 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 11:32:34 vmfsppjb006 systemd[1]: Started Session c5 of user root.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Reached target Paths.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Starting D-Bus User Message Bus Socket.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Reached target Timers.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Listening on D-Bus User Message Bus Socket.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Reached target Sockets.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Reached target Basic System.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Reached target Default.
Oct 25 11:32:34 vmfsppjb006 systemd[17477]: Startup finished in 53ms.
Oct 25 11:32:34 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Stopped target Default.
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Stopped target Basic System.
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Stopped target Sockets.
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Closed D-Bus User Message Bus Socket.
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Stopped target Paths.
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Reached target Shutdown.
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Starting Exit the Session...
Oct 25 11:32:35 vmfsppjb006 systemd[17477]: Stopped target Timers.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: user@0.service: Killing process 17516 (systemctl) with signal SIGKILL.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 11:32:35 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 11:32:35 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 11:32:41 vmfsppjb006 python3.6[1639]: 2021-10-25T02:32:41.263916Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 5;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 11:33:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:33:37 vmfsppjb006 dbus-daemon[17590]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:33:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:33:37 vmfsppjb006 setroubleshoot[17590]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:33:38 vmfsppjb006 setroubleshoot[17590]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:33:38 vmfsppjb006 platform-python[17590]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:34:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:34:37 vmfsppjb006 dbus-daemon[17653]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:34:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:34:37 vmfsppjb006 setroubleshoot[17653]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:34:38 vmfsppjb006 setroubleshoot[17653]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:34:38 vmfsppjb006 platform-python[17653]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 11:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 11:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 11:39:01 vmfsppjb006 systemd[1]: Started Session 28 of user omsagent.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Starting D-Bus User Message Bus Socket.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Reached target Paths.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Reached target Timers.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Listening on D-Bus User Message Bus Socket.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Reached target Sockets.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Reached target Basic System.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Reached target Default.
Oct 25 11:39:01 vmfsppjb006 systemd[17907]: Startup finished in 48ms.
Oct 25 11:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 11:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Stopped target Default.
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Stopped target Basic System.
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Stopped target Paths.
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Stopped target Timers.
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Stopped target Sockets.
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Closed D-Bus User Message Bus Socket.
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Reached target Shutdown.
Oct 25 11:39:03 vmfsppjb006 systemd[17907]: Starting Exit the Session...
Oct 25 11:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 18026 (systemctl) with signal SIGKILL.
Oct 25 11:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 11:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 11:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 11:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 11:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:39:37 vmfsppjb006 dbus-daemon[18068]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:39:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:39:38 vmfsppjb006 setroubleshoot[18068]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:39:38 vmfsppjb006 setroubleshoot[18068]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:39:38 vmfsppjb006 platform-python[18068]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 11:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 11:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 11:54:01 vmfsppjb006 systemd[1]: Started Session 30 of user omsagent.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Reached target Paths.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Starting D-Bus User Message Bus Socket.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Reached target Timers.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Listening on D-Bus User Message Bus Socket.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Reached target Sockets.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Reached target Basic System.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Reached target Default.
Oct 25 11:54:01 vmfsppjb006 systemd[18891]: Startup finished in 49ms.
Oct 25 11:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Stopped target Default.
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Stopped target Basic System.
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Stopped target Sockets.
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Closed D-Bus User Message Bus Socket.
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Stopped target Paths.
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Reached target Shutdown.
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Starting Exit the Session...
Oct 25 11:54:03 vmfsppjb006 systemd[18891]: Stopped target Timers.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 19010 (systemctl) with signal SIGKILL.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 11:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 11:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 11:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:54:37 vmfsppjb006 dbus-daemon[19061]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:54:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:54:38 vmfsppjb006 setroubleshoot[19061]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:54:38 vmfsppjb006 setroubleshoot[19061]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:54:38 vmfsppjb006 platform-python[19061]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 11:55:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 11:55:37 vmfsppjb006 dbus-daemon[19123]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 11:55:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 11:55:38 vmfsppjb006 setroubleshoot[19123]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 11:55:38 vmfsppjb006 setroubleshoot[19123]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 11:55:38 vmfsppjb006 platform-python[19123]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:02:01 vmfsppjb006 python3.6[1639]: 2021-10-25T03:02:01.355110Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 12:02:36 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:02:36 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 12:02:36 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 12:02:36 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 12:02:36 vmfsppjb006 systemd[1]: Started Session c6 of user root.
Oct 25 12:02:36 vmfsppjb006 dbus-daemon[19621]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Reached target Paths.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Reached target Timers.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Starting D-Bus User Message Bus Socket.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Listening on D-Bus User Message Bus Socket.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Reached target Sockets.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Reached target Basic System.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Reached target Default.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Startup finished in 126ms.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Stopped target Default.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Stopped target Basic System.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Stopped target Sockets.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Closed D-Bus User Message Bus Socket.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Stopped target Timers.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Stopped target Paths.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Reached target Shutdown.
Oct 25 12:02:37 vmfsppjb006 systemd[19620]: Starting Exit the Session...
Oct 25 12:02:37 vmfsppjb006 systemd[1]: user@0.service: Killing process 19661 (systemctl) with signal SIGKILL.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 12:02:37 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 12:02:37 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 12:02:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:02:38 vmfsppjb006 setroubleshoot[19621]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:02:38 vmfsppjb006 setroubleshoot[19621]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:02:38 vmfsppjb006 platform-python[19621]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:02:43 vmfsppjb006 python3.6[1639]: 2021-10-25T03:02:43.603960Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 6;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 12:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:03:37 vmfsppjb006 dbus-daemon[19731]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:03:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:03:38 vmfsppjb006 setroubleshoot[19731]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:03:38 vmfsppjb006 setroubleshoot[19731]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:03:38 vmfsppjb006 platform-python[19731]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:04:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:04:37 vmfsppjb006 dbus-daemon[19794]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:04:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:04:38 vmfsppjb006 setroubleshoot[19794]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:04:39 vmfsppjb006 setroubleshoot[19794]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:04:39 vmfsppjb006 platform-python[19794]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 12:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 12:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 12:09:01 vmfsppjb006 systemd[1]: Started Session 33 of user omsagent.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Reached target Paths.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Reached target Timers.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Starting D-Bus User Message Bus Socket.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Listening on D-Bus User Message Bus Socket.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Reached target Sockets.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Reached target Basic System.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Reached target Default.
Oct 25 12:09:01 vmfsppjb006 systemd[20055]: Startup finished in 47ms.
Oct 25 12:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Stopped target Default.
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Stopped target Basic System.
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Stopped target Paths.
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Stopped target Sockets.
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Closed D-Bus User Message Bus Socket.
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Reached target Shutdown.
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Starting Exit the Session...
Oct 25 12:09:04 vmfsppjb006 systemd[20055]: Stopped target Timers.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 20175 (systemctl) with signal SIGKILL.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 12:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 12:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 12:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:09:37 vmfsppjb006 dbus-daemon[20214]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:09:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:09:38 vmfsppjb006 setroubleshoot[20214]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:09:39 vmfsppjb006 setroubleshoot[20214]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:09:39 vmfsppjb006 platform-python[20214]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:10:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:10:37 vmfsppjb006 dbus-daemon[20281]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:10:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:10:38 vmfsppjb006 setroubleshoot[20281]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:10:39 vmfsppjb006 setroubleshoot[20281]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:10:39 vmfsppjb006 platform-python[20281]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:12:06 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 12:12:07 vmfsppjb006 dnf[20364]: packages-microsoft-com-prod                      12 kB/s | 3.0 kB     00:00
Oct 25 12:12:07 vmfsppjb006 dnf[20364]: MySQL 8.0 Community Server                       18 kB/s | 2.6 kB     00:00
Oct 25 12:12:07 vmfsppjb006 dnf[20364]: MySQL Connectors Community                       70 kB/s | 2.6 kB     00:00
Oct 25 12:12:07 vmfsppjb006 dnf[20364]: MySQL Tools Community                           300 kB/s | 2.6 kB     00:00
Oct 25 12:12:08 vmfsppjb006 dnf[20364]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.3 kB/s | 2.4 kB     00:00
Oct 25 12:12:09 vmfsppjb006 dnf[20364]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.9 kB/s | 2.8 kB     00:00
Oct 25 12:12:09 vmfsppjb006 dnf[20364]: Microsoft Azure RPMs for RHEL8 Extended Update  6.9 kB/s | 2.1 kB     00:00
Oct 25 12:12:09 vmfsppjb006 dnf[20364]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 25 12:12:10 vmfsppjb006 dnf[20364]: Zabbix Official Repository non-supported - x86_  13 kB/s | 3.0 kB     00:00
Oct 25 12:12:11 vmfsppjb006 dnf[20364]: Metadata cache created.
Oct 25 12:12:11 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 12:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 12:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 12:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 12:24:01 vmfsppjb006 systemd[1]: Started Session 35 of user omsagent.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Reached target Paths.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Starting D-Bus User Message Bus Socket.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Reached target Timers.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Listening on D-Bus User Message Bus Socket.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Reached target Sockets.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Reached target Basic System.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Reached target Default.
Oct 25 12:24:01 vmfsppjb006 systemd[21063]: Startup finished in 46ms.
Oct 25 12:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Stopped target Default.
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Stopped target Basic System.
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Stopped target Sockets.
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Closed D-Bus User Message Bus Socket.
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Stopped target Paths.
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Reached target Shutdown.
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Starting Exit the Session...
Oct 25 12:24:03 vmfsppjb006 systemd[21063]: Stopped target Timers.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 21182 (systemctl) with signal SIGKILL.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 12:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 12:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 12:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:24:37 vmfsppjb006 dbus-daemon[21222]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:24:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:24:38 vmfsppjb006 setroubleshoot[21222]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:24:39 vmfsppjb006 setroubleshoot[21222]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:24:39 vmfsppjb006 platform-python[21222]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:25:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:25:37 vmfsppjb006 dbus-daemon[21294]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:25:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:25:38 vmfsppjb006 setroubleshoot[21294]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:25:39 vmfsppjb006 setroubleshoot[21294]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:25:39 vmfsppjb006 platform-python[21294]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Started Session c7 of user root.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Starting D-Bus User Message Bus Socket.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Reached target Paths.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Reached target Timers.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Listening on D-Bus User Message Bus Socket.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Reached target Sockets.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Reached target Basic System.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Reached target Default.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Startup finished in 59ms.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Stopped target Default.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Stopped target Basic System.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Stopped target Paths.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Stopped target Timers.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Stopped target Sockets.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Closed D-Bus User Message Bus Socket.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Reached target Shutdown.
Oct 25 12:32:39 vmfsppjb006 systemd[21766]: Starting Exit the Session...
Oct 25 12:32:39 vmfsppjb006 systemd[1]: user@0.service: Killing process 21802 (systemctl) with signal SIGKILL.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 12:32:39 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 12:32:43 vmfsppjb006 python3.6[1639]: 2021-10-25T03:32:43.624660Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 7;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 12:33:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:33:37 vmfsppjb006 dbus-daemon[21873]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:33:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:33:38 vmfsppjb006 setroubleshoot[21873]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:33:39 vmfsppjb006 setroubleshoot[21873]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:33:39 vmfsppjb006 platform-python[21873]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 12:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 12:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 12:39:01 vmfsppjb006 systemd[1]: Started Session 38 of user omsagent.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Starting D-Bus User Message Bus Socket.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Reached target Paths.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Reached target Timers.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Listening on D-Bus User Message Bus Socket.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Reached target Sockets.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Reached target Basic System.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Reached target Default.
Oct 25 12:39:01 vmfsppjb006 systemd[22179]: Startup finished in 45ms.
Oct 25 12:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 12:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Stopped target Default.
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Stopped target Basic System.
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Stopped target Timers.
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Stopped target Paths.
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Stopped target Sockets.
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Closed D-Bus User Message Bus Socket.
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Reached target Shutdown.
Oct 25 12:39:04 vmfsppjb006 systemd[22179]: Starting Exit the Session...
Oct 25 12:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 22298 (systemctl) with signal SIGKILL.
Oct 25 12:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 12:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 12:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 12:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 12:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:39:37 vmfsppjb006 dbus-daemon[22336]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:39:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:39:37 vmfsppjb006 setroubleshoot[22336]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:39:38 vmfsppjb006 setroubleshoot[22336]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:39:38 vmfsppjb006 platform-python[22336]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:40:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:40:37 vmfsppjb006 dbus-daemon[22408]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:40:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:40:37 vmfsppjb006 setroubleshoot[22408]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:40:38 vmfsppjb006 setroubleshoot[22408]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:40:38 vmfsppjb006 platform-python[22408]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:50:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:50:37 vmfsppjb006 dbus-daemon[22967]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:50:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:50:37 vmfsppjb006 setroubleshoot[22967]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:50:38 vmfsppjb006 setroubleshoot[22967]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:50:38 vmfsppjb006 platform-python[22967]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 12:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 12:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 12:54:01 vmfsppjb006 systemd[1]: Started Session 40 of user omsagent.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Starting D-Bus User Message Bus Socket.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Reached target Paths.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Reached target Timers.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Listening on D-Bus User Message Bus Socket.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Reached target Sockets.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Reached target Basic System.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Reached target Default.
Oct 25 12:54:01 vmfsppjb006 systemd[23167]: Startup finished in 47ms.
Oct 25 12:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 12:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Stopped target Default.
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Stopped target Basic System.
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Stopped target Timers.
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Stopped target Sockets.
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Closed D-Bus User Message Bus Socket.
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Stopped target Paths.
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Reached target Shutdown.
Oct 25 12:54:03 vmfsppjb006 systemd[23167]: Starting Exit the Session...
Oct 25 12:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 23286 (systemctl) with signal SIGKILL.
Oct 25 12:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 12:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 12:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 12:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 12:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 12:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:54:37 vmfsppjb006 dbus-daemon[23326]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:54:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:54:38 vmfsppjb006 setroubleshoot[23326]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:54:38 vmfsppjb006 setroubleshoot[23326]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:54:38 vmfsppjb006 platform-python[23326]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 12:56:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 12:56:37 vmfsppjb006 dbus-daemon[23451]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 12:56:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 12:56:38 vmfsppjb006 setroubleshoot[23451]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 12:56:38 vmfsppjb006 setroubleshoot[23451]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 12:56:38 vmfsppjb006 platform-python[23451]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:02:02 vmfsppjb006 python3.6[1639]: 2021-10-25T04:02:02.631567Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Started Session c8 of user root.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Reached target Paths.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Reached target Timers.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Starting D-Bus User Message Bus Socket.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Listening on D-Bus User Message Bus Socket.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Reached target Sockets.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Reached target Basic System.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Reached target Default.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Startup finished in 47ms.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Stopped target Default.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Stopped target Basic System.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Stopped target Sockets.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Closed D-Bus User Message Bus Socket.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Stopped target Timers.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Stopped target Paths.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Reached target Shutdown.
Oct 25 13:02:41 vmfsppjb006 systemd[23895]: Starting Exit the Session...
Oct 25 13:02:41 vmfsppjb006 systemd[1]: user@0.service: Killing process 23931 (systemctl) with signal SIGKILL.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 13:02:41 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 13:02:44 vmfsppjb006 python3.6[1639]: 2021-10-25T04:02:44.802295Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 8;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 13:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:03:37 vmfsppjb006 dbus-daemon[23990]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:03:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:03:38 vmfsppjb006 setroubleshoot[23990]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:03:38 vmfsppjb006 setroubleshoot[23990]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:03:38 vmfsppjb006 platform-python[23990]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:05:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:05:37 vmfsppjb006 dbus-daemon[24116]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:05:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:05:38 vmfsppjb006 setroubleshoot[24116]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:05:38 vmfsppjb006 setroubleshoot[24116]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:05:38 vmfsppjb006 platform-python[24116]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 13:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 13:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 13:09:01 vmfsppjb006 systemd[1]: Started Session 43 of user omsagent.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Starting D-Bus User Message Bus Socket.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Reached target Paths.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Reached target Timers.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Listening on D-Bus User Message Bus Socket.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Reached target Sockets.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Reached target Basic System.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Reached target Default.
Oct 25 13:09:01 vmfsppjb006 systemd[24303]: Startup finished in 54ms.
Oct 25 13:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 13:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Stopped target Default.
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Stopped target Basic System.
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Stopped target Sockets.
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Stopped target Paths.
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Stopped target Timers.
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Closed D-Bus User Message Bus Socket.
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Reached target Shutdown.
Oct 25 13:09:03 vmfsppjb006 systemd[24303]: Starting Exit the Session...
Oct 25 13:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 24422 (systemctl) with signal SIGKILL.
Oct 25 13:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 13:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 13:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 13:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 13:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:09:37 vmfsppjb006 dbus-daemon[24473]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:09:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:09:38 vmfsppjb006 setroubleshoot[24473]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:09:38 vmfsppjb006 setroubleshoot[24473]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:09:38 vmfsppjb006 platform-python[24473]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:12:20 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 13:12:20 vmfsppjb006 dnf[24634]: Metadata cache refreshed recently.
Oct 25 13:12:20 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 13:12:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:12:37 vmfsppjb006 dbus-daemon[24654]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:12:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:12:38 vmfsppjb006 setroubleshoot[24654]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:12:38 vmfsppjb006 setroubleshoot[24654]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:12:38 vmfsppjb006 platform-python[24654]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:16:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:16:37 vmfsppjb006 dbus-daemon[24886]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:16:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:16:38 vmfsppjb006 setroubleshoot[24886]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:16:38 vmfsppjb006 setroubleshoot[24886]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:16:38 vmfsppjb006 platform-python[24886]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 13:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 13:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 13:24:01 vmfsppjb006 systemd[1]: Started Session 45 of user omsagent.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Starting D-Bus User Message Bus Socket.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Reached target Timers.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Reached target Paths.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Listening on D-Bus User Message Bus Socket.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Reached target Sockets.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Reached target Basic System.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Reached target Default.
Oct 25 13:24:02 vmfsppjb006 systemd[25316]: Startup finished in 69ms.
Oct 25 13:24:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 13:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Stopped target Default.
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Stopped target Basic System.
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Stopped target Timers.
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Stopped target Paths.
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Stopped target Sockets.
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Closed D-Bus User Message Bus Socket.
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Reached target Shutdown.
Oct 25 13:24:04 vmfsppjb006 systemd[25316]: Starting Exit the Session...
Oct 25 13:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 25438 (systemctl) with signal SIGKILL.
Oct 25 13:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 13:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 13:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 13:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 13:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:24:37 vmfsppjb006 dbus-daemon[25478]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:24:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:24:38 vmfsppjb006 setroubleshoot[25478]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:24:39 vmfsppjb006 setroubleshoot[25478]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:24:39 vmfsppjb006 platform-python[25478]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Started Session c9 of user root.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Starting D-Bus User Message Bus Socket.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Reached target Paths.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Reached target Timers.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Listening on D-Bus User Message Bus Socket.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Reached target Sockets.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Reached target Basic System.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Reached target Default.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Startup finished in 49ms.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Stopped target Default.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Stopped target Basic System.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Stopped target Sockets.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Closed D-Bus User Message Bus Socket.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Stopped target Timers.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Stopped target Paths.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Reached target Shutdown.
Oct 25 13:32:43 vmfsppjb006 systemd[26019]: Starting Exit the Session...
Oct 25 13:32:43 vmfsppjb006 systemd[1]: user@0.service: Killing process 26053 (systemctl) with signal SIGKILL.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 13:32:43 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 13:32:46 vmfsppjb006 python3.6[1639]: 2021-10-25T04:32:46.102980Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 9;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 13:33:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:33:37 vmfsppjb006 dbus-daemon[26114]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:33:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:33:38 vmfsppjb006 setroubleshoot[26114]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:33:39 vmfsppjb006 setroubleshoot[26114]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:33:39 vmfsppjb006 platform-python[26114]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:34:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:34:37 vmfsppjb006 dbus-daemon[26180]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:34:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:34:38 vmfsppjb006 setroubleshoot[26180]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:34:39 vmfsppjb006 setroubleshoot[26180]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:34:39 vmfsppjb006 platform-python[26180]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 13:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 13:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 13:39:01 vmfsppjb006 systemd[1]: Started Session 48 of user omsagent.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Reached target Timers.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Reached target Paths.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Starting D-Bus User Message Bus Socket.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Listening on D-Bus User Message Bus Socket.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Reached target Sockets.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Reached target Basic System.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Reached target Default.
Oct 25 13:39:02 vmfsppjb006 systemd[26443]: Startup finished in 47ms.
Oct 25 13:39:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 13:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Stopped target Default.
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Stopped target Basic System.
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Stopped target Sockets.
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Closed D-Bus User Message Bus Socket.
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Stopped target Timers.
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Stopped target Paths.
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Reached target Shutdown.
Oct 25 13:39:04 vmfsppjb006 systemd[26443]: Starting Exit the Session...
Oct 25 13:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 26562 (systemctl) with signal SIGKILL.
Oct 25 13:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 13:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 13:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 13:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 13:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:39:37 vmfsppjb006 dbus-daemon[26602]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:39:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:39:38 vmfsppjb006 setroubleshoot[26602]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:39:39 vmfsppjb006 setroubleshoot[26602]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:39:39 vmfsppjb006 platform-python[26602]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:40:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:40:37 vmfsppjb006 dbus-daemon[26674]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:40:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:40:38 vmfsppjb006 setroubleshoot[26674]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:40:39 vmfsppjb006 setroubleshoot[26674]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:40:39 vmfsppjb006 platform-python[26674]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:51:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:51:37 vmfsppjb006 dbus-daemon[27288]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:51:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:51:38 vmfsppjb006 setroubleshoot[27288]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:51:39 vmfsppjb006 setroubleshoot[27288]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:51:39 vmfsppjb006 platform-python[27288]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 13:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 13:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 13:54:01 vmfsppjb006 systemd[1]: Started Session 50 of user omsagent.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Starting D-Bus User Message Bus Socket.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Reached target Paths.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Reached target Timers.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Listening on D-Bus User Message Bus Socket.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Reached target Sockets.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Reached target Basic System.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Reached target Default.
Oct 25 13:54:01 vmfsppjb006 systemd[27431]: Startup finished in 46ms.
Oct 25 13:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Stopped target Default.
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Stopped target Basic System.
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Stopped target Paths.
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Stopped target Sockets.
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Closed D-Bus User Message Bus Socket.
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Reached target Shutdown.
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Starting Exit the Session...
Oct 25 13:54:03 vmfsppjb006 systemd[27431]: Stopped target Timers.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 27550 (systemctl) with signal SIGKILL.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 13:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 13:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 13:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:54:37 vmfsppjb006 dbus-daemon[27589]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:54:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:54:37 vmfsppjb006 setroubleshoot[27589]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:54:38 vmfsppjb006 setroubleshoot[27589]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:54:38 vmfsppjb006 platform-python[27589]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 13:57:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 13:57:37 vmfsppjb006 dbus-daemon[27768]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 13:57:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 13:57:37 vmfsppjb006 setroubleshoot[27768]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 13:57:38 vmfsppjb006 setroubleshoot[27768]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 13:57:38 vmfsppjb006 platform-python[27768]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:02:05 vmfsppjb006 python3.6[1639]: 2021-10-25T05:02:05.630531Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Started Session c10 of user root.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Reached target Paths.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Starting D-Bus User Message Bus Socket.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Reached target Timers.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Listening on D-Bus User Message Bus Socket.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Reached target Sockets.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Reached target Basic System.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Reached target Default.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Startup finished in 47ms.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Stopped target Default.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Stopped target Basic System.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Stopped target Paths.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Stopped target Timers.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Stopped target Sockets.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Closed D-Bus User Message Bus Socket.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Reached target Shutdown.
Oct 25 14:02:45 vmfsppjb006 systemd[28157]: Starting Exit the Session...
Oct 25 14:02:45 vmfsppjb006 systemd[1]: user@0.service: Killing process 28191 (systemctl) with signal SIGKILL.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 14:02:45 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 14:02:47 vmfsppjb006 python3.6[1639]: 2021-10-25T05:02:47.808089Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 10;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 14:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:03:37 vmfsppjb006 dbus-daemon[28252]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:03:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:03:37 vmfsppjb006 setroubleshoot[28252]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:03:38 vmfsppjb006 setroubleshoot[28252]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:03:38 vmfsppjb006 platform-python[28252]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:06:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:06:37 vmfsppjb006 dbus-daemon[28421]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:06:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:06:37 vmfsppjb006 setroubleshoot[28421]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:06:38 vmfsppjb006 setroubleshoot[28421]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:06:38 vmfsppjb006 platform-python[28421]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 14:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 14:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 14:09:01 vmfsppjb006 systemd[1]: Started Session 53 of user omsagent.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Starting D-Bus User Message Bus Socket.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Reached target Paths.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Reached target Timers.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Listening on D-Bus User Message Bus Socket.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Reached target Sockets.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Reached target Basic System.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Reached target Default.
Oct 25 14:09:01 vmfsppjb006 systemd[28567]: Startup finished in 45ms.
Oct 25 14:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 14:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Stopped target Default.
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Stopped target Basic System.
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Stopped target Paths.
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Stopped target Timers.
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Stopped target Sockets.
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Closed D-Bus User Message Bus Socket.
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Reached target Shutdown.
Oct 25 14:09:04 vmfsppjb006 systemd[28567]: Starting Exit the Session...
Oct 25 14:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 28686 (systemctl) with signal SIGKILL.
Oct 25 14:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 14:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 14:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 14:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 14:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:09:37 vmfsppjb006 dbus-daemon[28726]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:09:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:09:38 vmfsppjb006 setroubleshoot[28726]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:09:38 vmfsppjb006 setroubleshoot[28726]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:09:38 vmfsppjb006 platform-python[28726]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:10:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:10:37 vmfsppjb006 dbus-daemon[28797]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:10:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:10:38 vmfsppjb006 setroubleshoot[28797]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:10:38 vmfsppjb006 setroubleshoot[28797]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:10:38 vmfsppjb006 platform-python[28797]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:12:23 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 14:12:24 vmfsppjb006 dnf[28905]: Metadata cache refreshed recently.
Oct 25 14:12:24 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 14:15:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:15:37 vmfsppjb006 dbus-daemon[29093]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:15:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:15:38 vmfsppjb006 setroubleshoot[29093]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:15:38 vmfsppjb006 setroubleshoot[29093]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:15:38 vmfsppjb006 platform-python[29093]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 14:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 14:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 14:24:01 vmfsppjb006 systemd[1]: Started Session 55 of user omsagent.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Reached target Timers.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Reached target Paths.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Starting D-Bus User Message Bus Socket.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Listening on D-Bus User Message Bus Socket.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Reached target Sockets.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Reached target Basic System.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Reached target Default.
Oct 25 14:24:01 vmfsppjb006 systemd[29567]: Startup finished in 49ms.
Oct 25 14:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 14:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Stopped target Default.
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Stopped target Basic System.
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Stopped target Paths.
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Stopped target Timers.
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Stopped target Sockets.
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Closed D-Bus User Message Bus Socket.
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Reached target Shutdown.
Oct 25 14:24:03 vmfsppjb006 systemd[29567]: Starting Exit the Session...
Oct 25 14:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 29685 (systemctl) with signal SIGKILL.
Oct 25 14:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 14:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 14:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 14:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 14:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:24:37 vmfsppjb006 dbus-daemon[29732]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:24:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:24:38 vmfsppjb006 setroubleshoot[29732]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:24:38 vmfsppjb006 setroubleshoot[29732]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:24:38 vmfsppjb006 platform-python[29732]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:25:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:25:37 vmfsppjb006 dbus-daemon[29797]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:25:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:25:38 vmfsppjb006 setroubleshoot[29797]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:25:38 vmfsppjb006 setroubleshoot[29797]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:25:38 vmfsppjb006 platform-python[29797]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Started Session c11 of user root.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Reached target Paths.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Starting D-Bus User Message Bus Socket.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Reached target Timers.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Listening on D-Bus User Message Bus Socket.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Reached target Sockets.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Reached target Basic System.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Reached target Default.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Startup finished in 45ms.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Stopped target Default.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Stopped target Basic System.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Stopped target Paths.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Stopped target Sockets.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Closed D-Bus User Message Bus Socket.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Reached target Shutdown.
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Starting Exit the Session...
Oct 25 14:32:47 vmfsppjb006 systemd[30281]: Stopped target Timers.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: user@0.service: Killing process 30315 (systemctl) with signal SIGKILL.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 14:32:47 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 14:32:53 vmfsppjb006 python3.6[1639]: 2021-10-25T05:32:53.352684Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 11;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 14:33:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:33:37 vmfsppjb006 dbus-daemon[30375]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:33:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:33:38 vmfsppjb006 setroubleshoot[30375]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:33:38 vmfsppjb006 setroubleshoot[30375]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:33:38 vmfsppjb006 platform-python[30375]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:35:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:35:37 vmfsppjb006 dbus-daemon[30501]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:35:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:35:38 vmfsppjb006 setroubleshoot[30501]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:35:39 vmfsppjb006 setroubleshoot[30501]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:35:39 vmfsppjb006 platform-python[30501]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 14:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 14:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 14:39:01 vmfsppjb006 systemd[1]: Started Session 58 of user omsagent.
Oct 25 14:39:01 vmfsppjb006 systemd[30696]: Starting D-Bus User Message Bus Socket.
Oct 25 14:39:02 vmfsppjb006 systemd[30696]: Reached target Paths.
Oct 25 14:39:02 vmfsppjb006 systemd[30696]: Reached target Timers.
Oct 25 14:39:02 vmfsppjb006 systemd[30696]: Listening on D-Bus User Message Bus Socket.
Oct 25 14:39:02 vmfsppjb006 systemd[30696]: Reached target Sockets.
Oct 25 14:39:02 vmfsppjb006 systemd[30696]: Reached target Basic System.
Oct 25 14:39:02 vmfsppjb006 systemd[30696]: Reached target Default.
Oct 25 14:39:02 vmfsppjb006 systemd[30696]: Startup finished in 48ms.
Oct 25 14:39:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 14:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Stopped target Default.
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Stopped target Basic System.
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Stopped target Paths.
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Stopped target Timers.
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Stopped target Sockets.
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Closed D-Bus User Message Bus Socket.
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Reached target Shutdown.
Oct 25 14:39:04 vmfsppjb006 systemd[30696]: Starting Exit the Session...
Oct 25 14:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 30819 (systemctl) with signal SIGKILL.
Oct 25 14:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 14:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 14:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 14:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 14:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:39:37 vmfsppjb006 dbus-daemon[30859]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:39:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:39:38 vmfsppjb006 setroubleshoot[30859]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:39:39 vmfsppjb006 setroubleshoot[30859]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:39:39 vmfsppjb006 platform-python[30859]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:40:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:40:37 vmfsppjb006 dbus-daemon[30921]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:40:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:40:38 vmfsppjb006 setroubleshoot[30921]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:40:39 vmfsppjb006 setroubleshoot[30921]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:40:39 vmfsppjb006 platform-python[30921]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 14:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 14:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 14:54:01 vmfsppjb006 systemd[1]: Started Session 60 of user omsagent.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Reached target Timers.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Reached target Paths.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Starting D-Bus User Message Bus Socket.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Listening on D-Bus User Message Bus Socket.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Reached target Sockets.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Reached target Basic System.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Reached target Default.
Oct 25 14:54:01 vmfsppjb006 systemd[31682]: Startup finished in 46ms.
Oct 25 14:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 14:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Stopped target Default.
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Stopped target Basic System.
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Stopped target Sockets.
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Closed D-Bus User Message Bus Socket.
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Stopped target Timers.
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Stopped target Paths.
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Reached target Shutdown.
Oct 25 14:54:03 vmfsppjb006 systemd[31682]: Starting Exit the Session...
Oct 25 14:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 31801 (systemctl) with signal SIGKILL.
Oct 25 14:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 14:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 14:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 14:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 14:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 14:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:54:37 vmfsppjb006 dbus-daemon[31840]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:54:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:54:38 vmfsppjb006 setroubleshoot[31840]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:54:39 vmfsppjb006 setroubleshoot[31840]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:54:39 vmfsppjb006 platform-python[31840]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 14:55:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 14:55:37 vmfsppjb006 dbus-daemon[31911]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 14:55:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 14:55:38 vmfsppjb006 setroubleshoot[31911]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 14:55:39 vmfsppjb006 setroubleshoot[31911]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 14:55:39 vmfsppjb006 platform-python[31911]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:01:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:01:37 vmfsppjb006 dbus-daemon[32262]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:01:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:01:38 vmfsppjb006 setroubleshoot[32262]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:01:39 vmfsppjb006 setroubleshoot[32262]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:01:39 vmfsppjb006 platform-python[32262]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:02:05 vmfsppjb006 python3.6[1639]: 2021-10-25T06:02:05.817525Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 15:02:48 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 15:02:48 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 15:02:48 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 15:02:48 vmfsppjb006 systemd[1]: Started Session c12 of user root.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Reached target Timers.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Starting D-Bus User Message Bus Socket.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Reached target Paths.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Reached target Sockets.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Reached target Basic System.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Reached target Default.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Startup finished in 48ms.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Stopped target Default.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Stopped target Basic System.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Stopped target Timers.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Stopped target Paths.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Stopped target Sockets.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Closed D-Bus User Message Bus Socket.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Reached target Shutdown.
Oct 25 15:02:49 vmfsppjb006 systemd[32427]: Starting Exit the Session...
Oct 25 15:02:49 vmfsppjb006 systemd[1]: user@0.service: Killing process 32462 (systemctl) with signal SIGKILL.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 15:02:49 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 15:02:49 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 15:02:54 vmfsppjb006 python3.6[1639]: 2021-10-25T06:02:54.033071Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 12;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 15:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:03:37 vmfsppjb006 dbus-daemon[32522]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:03:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:03:38 vmfsppjb006 setroubleshoot[32522]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:03:39 vmfsppjb006 setroubleshoot[32522]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:03:39 vmfsppjb006 platform-python[32522]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:04:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:04:37 vmfsppjb006 dbus-daemon[32576]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:04:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:04:38 vmfsppjb006 setroubleshoot[32576]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:04:39 vmfsppjb006 setroubleshoot[32576]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:04:39 vmfsppjb006 platform-python[32576]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:07:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:07:37 vmfsppjb006 dbus-daemon[32769]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:07:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:07:38 vmfsppjb006 setroubleshoot[32769]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:07:39 vmfsppjb006 setroubleshoot[32769]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:07:39 vmfsppjb006 platform-python[32769]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 15:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 15:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 15:09:01 vmfsppjb006 systemd[1]: Started Session 63 of user omsagent.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Starting D-Bus User Message Bus Socket.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Reached target Timers.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Reached target Paths.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Reached target Sockets.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Reached target Basic System.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Reached target Default.
Oct 25 15:09:01 vmfsppjb006 systemd[32856]: Startup finished in 49ms.
Oct 25 15:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 15:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Stopped target Default.
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Stopped target Basic System.
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Stopped target Paths.
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Stopped target Sockets.
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Stopped target Timers.
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Closed D-Bus User Message Bus Socket.
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Reached target Shutdown.
Oct 25 15:09:04 vmfsppjb006 systemd[32856]: Starting Exit the Session...
Oct 25 15:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 32976 (systemctl) with signal SIGKILL.
Oct 25 15:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 15:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 15:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 15:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 15:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:09:38 vmfsppjb006 dbus-daemon[33017]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:09:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:09:38 vmfsppjb006 setroubleshoot[33017]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:09:39 vmfsppjb006 setroubleshoot[33017]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:09:39 vmfsppjb006 platform-python[33017]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:11:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:11:37 vmfsppjb006 dbus-daemon[33141]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:11:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:11:37 vmfsppjb006 setroubleshoot[33141]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:11:38 vmfsppjb006 setroubleshoot[33141]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:11:38 vmfsppjb006 platform-python[33141]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:12:27 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 15:12:28 vmfsppjb006 dnf[33197]: packages-microsoft-com-prod                      12 kB/s | 3.0 kB     00:00
Oct 25 15:12:28 vmfsppjb006 dnf[33197]: MySQL 8.0 Community Server                       70 kB/s | 2.6 kB     00:00
Oct 25 15:12:28 vmfsppjb006 dnf[33197]: MySQL Connectors Community                      279 kB/s | 2.6 kB     00:00
Oct 25 15:12:28 vmfsppjb006 dnf[33197]: MySQL Tools Community                           105 kB/s | 2.6 kB     00:00
Oct 25 15:12:28 vmfsppjb006 dnf[33197]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.3 kB/s | 2.4 kB     00:00
Oct 25 15:12:29 vmfsppjb006 dnf[33197]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.8 kB/s | 2.8 kB     00:00
Oct 25 15:12:29 vmfsppjb006 dnf[33197]: Microsoft Azure RPMs for RHEL8 Extended Update  6.7 kB/s | 2.1 kB     00:00
Oct 25 15:12:30 vmfsppjb006 dnf[33197]: Zabbix Official Repository - x86_64              13 kB/s | 2.9 kB     00:00
Oct 25 15:12:30 vmfsppjb006 dnf[33197]: Zabbix Official Repository non-supported - x86_  13 kB/s | 3.0 kB     00:00
Oct 25 15:12:31 vmfsppjb006 dnf[33197]: Metadata cache created.
Oct 25 15:12:31 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 15:16:16 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 25 15:16:16 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 25 15:16:16 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 25 15:16:16 vmfsppjb006 systemd[1]: Started Session 65 of user jobuser.
Oct 25 15:16:16 vmfsppjb006 systemd-logind[943]: New session 65 of user jobuser.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Starting D-Bus User Message Bus Socket.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Reached target Paths.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Reached target Timers.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Reached target Sockets.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Reached target Basic System.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Reached target Default.
Oct 25 15:16:16 vmfsppjb006 systemd[33499]: Startup finished in 45ms.
Oct 25 15:16:16 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 25 15:16:21 vmfsppjb006 powershell[33525]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 25 15:16:22 vmfsppjb006 powershell[33525]: (7.1.4:8:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 33525 in AppDomain: None.
Oct 25 15:16:22 vmfsppjb006 systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 33537 (.NET ThreadPool)
Oct 25 15:16:22 vmfsppjb006 systemd[1]: Mounting Arbitrary Executable File Formats File System...
Oct 25 15:16:22 vmfsppjb006 systemd[1]: Mounted Arbitrary Executable File Formats File System.
Oct 25 15:16:22 vmfsppjb006 powershell[33525]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 8d0432bc-3037-44b7-b2fb-3e0649beee72#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:25 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:16:37 vmfsppjb006 dbus-daemon[33577]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:16:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:16:38 vmfsppjb006 setroubleshoot[33577]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:16:38 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 3):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 25 15:16:38 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 3):#012DA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCB
Oct 25 15:16:38 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (3 of 3):#012xxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: b09bb284-8d60-4cb0-9782-7f883135b2af#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 25 15:16:38 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 7223521e-ebc5-4cab-ac89-4d6143a2b892#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 25 15:16:38 vmfsppjb006 setroubleshoot[33577]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:16:38 vmfsppjb006 platform-python[33577]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:16:51 vmfsppjb006 powershell[33525]: (7.1.4:A:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = fc11d2f6-19a4-4224-b3fd-81cc10591bdc#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = d8bc6ab0-e7bd-42bb-a8df-a0c12c4c1340#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 492#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 25 15:16:51 vmfsppjb006 powershell[33525]: (7.1.4:8:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 33525 in AppDomain: None.  Error Message: Operation canceled.
Oct 25 15:16:51 vmfsppjb006 systemd-logind[943]: Session 65 logged out. Waiting for processes to exit.
Oct 25 15:16:51 vmfsppjb006 systemd-logind[943]: Removed session 65.
Oct 25 15:16:51 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 25 15:16:51 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Stopped target Default.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Stopped target Basic System.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Stopped target Timers.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Stopped target Paths.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Stopped target Sockets.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Closed D-Bus User Message Bus Socket.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Reached target Shutdown.
Oct 25 15:16:51 vmfsppjb006 systemd[33499]: Starting Exit the Session...
Oct 25 15:16:51 vmfsppjb006 systemd[1]: user@1003.service: Killing process 33604 (systemctl) with signal SIGKILL.
Oct 25 15:16:51 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 25 15:16:51 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 25 15:16:51 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 25 15:16:51 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 25 15:16:51 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 25 15:16:51 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 25 15:17:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:17:37 vmfsppjb006 dbus-daemon[33661]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:17:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:17:37 vmfsppjb006 setroubleshoot[33661]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:17:38 vmfsppjb006 setroubleshoot[33661]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:17:38 vmfsppjb006 platform-python[33661]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:22:19 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 25 15:22:19 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 25 15:22:19 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 25 15:22:19 vmfsppjb006 systemd[1]: Started Session 67 of user jobuser.
Oct 25 15:22:19 vmfsppjb006 systemd-logind[943]: New session 67 of user jobuser.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Reached target Timers.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Reached target Paths.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Starting D-Bus User Message Bus Socket.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Reached target Sockets.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Reached target Basic System.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Reached target Default.
Oct 25 15:22:20 vmfsppjb006 systemd[33943]: Startup finished in 48ms.
Oct 25 15:22:20 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 25 15:22:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:22:37 vmfsppjb006 dbus-daemon[34005]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:22:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:22:38 vmfsppjb006 setroubleshoot[34005]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:22:38 vmfsppjb006 setroubleshoot[34005]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:22:38 vmfsppjb006 platform-python[34005]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:23:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:23:37 vmfsppjb006 dbus-daemon[34070]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:23:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:23:38 vmfsppjb006 setroubleshoot[34070]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:23:38 vmfsppjb006 setroubleshoot[34070]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:23:38 vmfsppjb006 platform-python[34070]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:23:57 vmfsppjb006 systemd-logind[943]: Session 67 logged out. Waiting for processes to exit.
Oct 25 15:23:57 vmfsppjb006 systemd-logind[943]: Removed session 67.
Oct 25 15:23:57 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 25 15:23:57 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Stopped target Default.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Stopped target Basic System.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Stopped target Timers.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Stopped target Paths.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Stopped target Sockets.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Closed D-Bus User Message Bus Socket.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Reached target Shutdown.
Oct 25 15:23:57 vmfsppjb006 systemd[33943]: Starting Exit the Session...
Oct 25 15:23:57 vmfsppjb006 systemd[1]: user@1003.service: Killing process 34096 (systemctl) with signal SIGKILL.
Oct 25 15:23:57 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 25 15:23:57 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 25 15:23:57 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 25 15:23:57 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 25 15:23:57 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 25 15:23:57 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 25 15:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 15:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 15:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 15:24:01 vmfsppjb006 systemd[1]: Started Session 69 of user omsagent.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Reached target Paths.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Starting D-Bus User Message Bus Socket.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Reached target Timers.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Reached target Sockets.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Reached target Basic System.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Reached target Default.
Oct 25 15:24:01 vmfsppjb006 systemd[34108]: Startup finished in 47ms.
Oct 25 15:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Stopped target Default.
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Stopped target Basic System.
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Stopped target Sockets.
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Closed D-Bus User Message Bus Socket.
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Stopped target Paths.
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Reached target Shutdown.
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Starting Exit the Session...
Oct 25 15:24:03 vmfsppjb006 systemd[34108]: Stopped target Timers.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 34227 (systemctl) with signal SIGKILL.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 15:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 15:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 15:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:24:37 vmfsppjb006 dbus-daemon[34266]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:24:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:24:38 vmfsppjb006 setroubleshoot[34266]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:24:38 vmfsppjb006 setroubleshoot[34266]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:24:38 vmfsppjb006 platform-python[34266]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:25:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:25:37 vmfsppjb006 dbus-daemon[34338]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:25:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:25:38 vmfsppjb006 setroubleshoot[34338]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:25:38 vmfsppjb006 setroubleshoot[34338]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:25:38 vmfsppjb006 platform-python[34338]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:32:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:32:37 vmfsppjb006 dbus-daemon[34736]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:32:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:32:38 vmfsppjb006 setroubleshoot[34736]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:32:38 vmfsppjb006 setroubleshoot[34736]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:32:38 vmfsppjb006 platform-python[34736]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:32:50 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 15:32:50 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 15:32:50 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 15:32:50 vmfsppjb006 systemd[1]: Started Session c13 of user root.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Reached target Paths.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Reached target Timers.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Starting D-Bus User Message Bus Socket.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Reached target Sockets.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Reached target Basic System.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Reached target Default.
Oct 25 15:32:50 vmfsppjb006 systemd[34835]: Startup finished in 48ms.
Oct 25 15:32:50 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 15:32:51 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 15:32:51 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Stopped target Default.
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Stopped target Basic System.
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Stopped target Sockets.
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Stopped target Paths.
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Stopped target Timers.
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Closed D-Bus User Message Bus Socket.
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Reached target Shutdown.
Oct 25 15:32:51 vmfsppjb006 systemd[34835]: Starting Exit the Session...
Oct 25 15:32:51 vmfsppjb006 systemd[1]: user@0.service: Killing process 34869 (systemctl) with signal SIGKILL.
Oct 25 15:32:51 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 15:32:51 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 15:32:51 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 15:32:51 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 15:32:51 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 15:32:51 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 15:32:59 vmfsppjb006 python3.6[1639]: 2021-10-25T06:32:59.477842Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 13;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 15:33:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:33:37 vmfsppjb006 dbus-daemon[34930]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:33:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:33:38 vmfsppjb006 setroubleshoot[34930]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:33:38 vmfsppjb006 setroubleshoot[34930]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:33:38 vmfsppjb006 platform-python[34930]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:34:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:34:37 vmfsppjb006 dbus-daemon[34992]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:34:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:34:38 vmfsppjb006 setroubleshoot[34992]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:34:38 vmfsppjb006 setroubleshoot[34992]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:34:38 vmfsppjb006 platform-python[34992]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:39:02 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 15:39:02 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 15:39:02 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 15:39:02 vmfsppjb006 systemd[1]: Started Session 72 of user omsagent.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Starting D-Bus User Message Bus Socket.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Reached target Paths.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Reached target Timers.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Reached target Sockets.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Reached target Basic System.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Reached target Default.
Oct 25 15:39:02 vmfsppjb006 systemd[35247]: Startup finished in 45ms.
Oct 25 15:39:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 15:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Stopped target Default.
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Stopped target Basic System.
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Stopped target Paths.
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Stopped target Sockets.
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Closed D-Bus User Message Bus Socket.
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Stopped target Timers.
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Reached target Shutdown.
Oct 25 15:39:04 vmfsppjb006 systemd[35247]: Starting Exit the Session...
Oct 25 15:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 35368 (systemctl) with signal SIGKILL.
Oct 25 15:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 15:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 15:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 15:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 15:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:39:37 vmfsppjb006 dbus-daemon[35412]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:39:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:39:38 vmfsppjb006 setroubleshoot[35412]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:39:38 vmfsppjb006 setroubleshoot[35412]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:39:38 vmfsppjb006 platform-python[35412]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:40:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:40:37 vmfsppjb006 dbus-daemon[35480]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:40:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:40:38 vmfsppjb006 setroubleshoot[35480]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:40:38 vmfsppjb006 setroubleshoot[35480]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:40:38 vmfsppjb006 platform-python[35480]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:52:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:52:37 vmfsppjb006 dbus-daemon[36170]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:52:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:52:38 vmfsppjb006 setroubleshoot[36170]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:52:39 vmfsppjb006 setroubleshoot[36170]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:52:39 vmfsppjb006 platform-python[36170]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 15:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 15:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 15:54:01 vmfsppjb006 systemd[1]: Started Session 74 of user omsagent.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Reached target Paths.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Starting D-Bus User Message Bus Socket.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Reached target Timers.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Listening on D-Bus User Message Bus Socket.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Reached target Sockets.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Reached target Basic System.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Reached target Default.
Oct 25 15:54:01 vmfsppjb006 systemd[36250]: Startup finished in 46ms.
Oct 25 15:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 15:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Stopped target Default.
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Stopped target Basic System.
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Stopped target Timers.
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Stopped target Paths.
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Stopped target Sockets.
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Closed D-Bus User Message Bus Socket.
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Reached target Shutdown.
Oct 25 15:54:02 vmfsppjb006 systemd[36250]: Starting Exit the Session...
Oct 25 15:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 36304 (systemctl) with signal SIGKILL.
Oct 25 15:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 15:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 15:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 15:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 15:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 15:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:54:37 vmfsppjb006 dbus-daemon[36343]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:54:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:54:38 vmfsppjb006 setroubleshoot[36343]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:54:39 vmfsppjb006 setroubleshoot[36343]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:54:39 vmfsppjb006 platform-python[36343]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 15:55:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 15:55:37 vmfsppjb006 dbus-daemon[36406]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 15:55:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 15:55:38 vmfsppjb006 setroubleshoot[36406]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 15:55:39 vmfsppjb006 setroubleshoot[36406]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 15:55:39 vmfsppjb006 platform-python[36406]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:00:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:00:37 vmfsppjb006 dbus-daemon[36703]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:00:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:00:38 vmfsppjb006 setroubleshoot[36703]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:00:39 vmfsppjb006 setroubleshoot[36703]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:00:39 vmfsppjb006 platform-python[36703]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:02:11 vmfsppjb006 python3.6[1639]: 2021-10-25T07:02:11.767715Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 16:02:52 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 16:02:52 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 16:02:52 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 16:02:52 vmfsppjb006 systemd[1]: Started Session c14 of user root.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Starting D-Bus User Message Bus Socket.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Reached target Paths.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Reached target Timers.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Listening on D-Bus User Message Bus Socket.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Reached target Sockets.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Reached target Basic System.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Reached target Default.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Startup finished in 46ms.
Oct 25 16:02:52 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 16:02:52 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 16:02:52 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Stopped target Default.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Stopped target Basic System.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Stopped target Paths.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Stopped target Timers.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Stopped target Sockets.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Closed D-Bus User Message Bus Socket.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Reached target Shutdown.
Oct 25 16:02:52 vmfsppjb006 systemd[36932]: Starting Exit the Session...
Oct 25 16:02:53 vmfsppjb006 systemd[1]: user@0.service: Killing process 36966 (systemctl) with signal SIGKILL.
Oct 25 16:02:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 16:02:53 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 16:02:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 16:02:53 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 16:02:53 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 16:02:53 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 16:02:59 vmfsppjb006 python3.6[1639]: 2021-10-25T07:02:59.982719Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 14;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 16:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:03:37 vmfsppjb006 dbus-daemon[37018]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:03:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:03:38 vmfsppjb006 setroubleshoot[37018]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:03:39 vmfsppjb006 setroubleshoot[37018]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:03:39 vmfsppjb006 platform-python[37018]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 16:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 16:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 16:09:01 vmfsppjb006 systemd[1]: Started Session 77 of user omsagent.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Reached target Timers.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Reached target Paths.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Starting D-Bus User Message Bus Socket.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Listening on D-Bus User Message Bus Socket.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Reached target Sockets.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Reached target Basic System.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Reached target Default.
Oct 25 16:09:01 vmfsppjb006 systemd[37336]: Startup finished in 54ms.
Oct 25 16:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Stopped target Default.
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Stopped target Basic System.
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Stopped target Paths.
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Stopped target Sockets.
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Closed D-Bus User Message Bus Socket.
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Reached target Shutdown.
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Starting Exit the Session...
Oct 25 16:09:03 vmfsppjb006 systemd[37336]: Stopped target Timers.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 37456 (systemctl) with signal SIGKILL.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 16:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 16:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 16:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:09:37 vmfsppjb006 dbus-daemon[37496]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:09:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:09:38 vmfsppjb006 setroubleshoot[37496]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:09:39 vmfsppjb006 setroubleshoot[37496]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:09:39 vmfsppjb006 platform-python[37496]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:10:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:10:37 vmfsppjb006 dbus-daemon[37566]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:10:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:10:38 vmfsppjb006 setroubleshoot[37566]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:10:39 vmfsppjb006 setroubleshoot[37566]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:10:39 vmfsppjb006 platform-python[37566]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:12:33 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 16:12:33 vmfsppjb006 dnf[37680]: Metadata cache refreshed recently.
Oct 25 16:12:34 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 16:15:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:15:37 vmfsppjb006 dbus-daemon[37855]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:15:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:15:38 vmfsppjb006 setroubleshoot[37855]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:15:39 vmfsppjb006 setroubleshoot[37855]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:15:39 vmfsppjb006 platform-python[37855]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 16:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 16:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 16:24:01 vmfsppjb006 systemd[1]: Started Session 79 of user omsagent.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Starting D-Bus User Message Bus Socket.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Reached target Paths.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Reached target Timers.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Listening on D-Bus User Message Bus Socket.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Reached target Sockets.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Reached target Basic System.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Reached target Default.
Oct 25 16:24:01 vmfsppjb006 systemd[38346]: Startup finished in 51ms.
Oct 25 16:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Stopped target Default.
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Stopped target Basic System.
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Stopped target Sockets.
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Closed D-Bus User Message Bus Socket.
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Stopped target Paths.
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Reached target Shutdown.
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Starting Exit the Session...
Oct 25 16:24:03 vmfsppjb006 systemd[38346]: Stopped target Timers.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 38465 (systemctl) with signal SIGKILL.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 16:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 16:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 16:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:24:37 vmfsppjb006 dbus-daemon[38506]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:24:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:24:37 vmfsppjb006 setroubleshoot[38506]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:24:38 vmfsppjb006 setroubleshoot[38506]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:24:38 vmfsppjb006 platform-python[38506]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:25:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:25:37 vmfsppjb006 dbus-daemon[38578]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:25:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:25:37 vmfsppjb006 setroubleshoot[38578]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:25:38 vmfsppjb006 setroubleshoot[38578]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:25:38 vmfsppjb006 platform-python[38578]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:32:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:32:37 vmfsppjb006 dbus-daemon[38982]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:32:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:32:38 vmfsppjb006 setroubleshoot[38982]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:32:38 vmfsppjb006 setroubleshoot[38982]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:32:38 vmfsppjb006 platform-python[38982]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:32:54 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 16:32:54 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 16:32:54 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 16:32:54 vmfsppjb006 systemd[1]: Started Session c15 of user root.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Reached target Timers.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Starting D-Bus User Message Bus Socket.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Reached target Paths.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Listening on D-Bus User Message Bus Socket.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Reached target Sockets.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Reached target Basic System.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Reached target Default.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Startup finished in 46ms.
Oct 25 16:32:54 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 16:32:54 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 16:32:54 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Stopped target Default.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Stopped target Basic System.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Stopped target Sockets.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Closed D-Bus User Message Bus Socket.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Stopped target Paths.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Reached target Shutdown.
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Starting Exit the Session...
Oct 25 16:32:54 vmfsppjb006 systemd[39083]: Stopped target Timers.
Oct 25 16:32:55 vmfsppjb006 systemd[1]: user@0.service: Killing process 39117 (systemctl) with signal SIGKILL.
Oct 25 16:32:55 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 16:32:55 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 16:32:55 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 16:32:55 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 16:32:55 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 16:32:55 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 16:33:00 vmfsppjb006 python3.6[1639]: 2021-10-25T07:33:00.013481Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 15;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 16:33:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:33:37 vmfsppjb006 dbus-daemon[39176]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:33:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:33:38 vmfsppjb006 setroubleshoot[39176]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:33:38 vmfsppjb006 setroubleshoot[39176]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:33:38 vmfsppjb006 platform-python[39176]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:34:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:34:37 vmfsppjb006 dbus-daemon[39240]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:34:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:34:38 vmfsppjb006 setroubleshoot[39240]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:34:38 vmfsppjb006 setroubleshoot[39240]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:34:38 vmfsppjb006 platform-python[39240]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 16:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 16:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 16:39:01 vmfsppjb006 systemd[1]: Started Session 82 of user omsagent.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Reached target Paths.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Reached target Timers.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Starting D-Bus User Message Bus Socket.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Listening on D-Bus User Message Bus Socket.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Reached target Sockets.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Reached target Basic System.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Reached target Default.
Oct 25 16:39:01 vmfsppjb006 systemd[39497]: Startup finished in 45ms.
Oct 25 16:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Stopped target Default.
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Stopped target Basic System.
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Stopped target Sockets.
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Closed D-Bus User Message Bus Socket.
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Stopped target Paths.
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Reached target Shutdown.
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Starting Exit the Session...
Oct 25 16:39:04 vmfsppjb006 systemd[39497]: Stopped target Timers.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 39617 (systemctl) with signal SIGKILL.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 16:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 16:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 16:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:39:37 vmfsppjb006 dbus-daemon[39657]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:39:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:39:38 vmfsppjb006 setroubleshoot[39657]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:39:38 vmfsppjb006 setroubleshoot[39657]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:39:38 vmfsppjb006 platform-python[39657]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:41:52 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:41:52 vmfsppjb006 dbus-daemon[39808]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:41:53 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:41:54 vmfsppjb006 setroubleshoot[39808]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 16:41:54 vmfsppjb006 platform-python[39808]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 16:45:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:45:37 vmfsppjb006 dbus-daemon[40038]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:45:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:45:38 vmfsppjb006 setroubleshoot[40038]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:45:38 vmfsppjb006 setroubleshoot[40038]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:45:38 vmfsppjb006 platform-python[40038]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:45:46 vmfsppjb006 setroubleshoot[40038]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 16:45:46 vmfsppjb006 platform-python[40038]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 16:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 16:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 16:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 16:54:01 vmfsppjb006 systemd[1]: Started Session 84 of user omsagent.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Reached target Timers.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Starting D-Bus User Message Bus Socket.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Reached target Paths.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Listening on D-Bus User Message Bus Socket.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Reached target Sockets.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Reached target Basic System.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Reached target Default.
Oct 25 16:54:01 vmfsppjb006 systemd[40517]: Startup finished in 48ms.
Oct 25 16:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 16:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Stopped target Default.
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Stopped target Basic System.
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Stopped target Paths.
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Stopped target Timers.
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Stopped target Sockets.
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Closed D-Bus User Message Bus Socket.
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Reached target Shutdown.
Oct 25 16:54:03 vmfsppjb006 systemd[40517]: Starting Exit the Session...
Oct 25 16:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 40637 (systemctl) with signal SIGKILL.
Oct 25 16:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 16:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 16:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 16:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 16:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 16:54:12 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:54:12 vmfsppjb006 dbus-daemon[40657]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:54:12 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:54:13 vmfsppjb006 setroubleshoot[40657]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 16:54:13 vmfsppjb006 platform-python[40657]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 16:54:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:54:37 vmfsppjb006 dbus-daemon[40684]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:54:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:54:38 vmfsppjb006 setroubleshoot[40684]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 16:54:39 vmfsppjb006 setroubleshoot[40684]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 16:54:39 vmfsppjb006 platform-python[40684]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 16:54:52 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 16:54:52 vmfsppjb006 dbus-daemon[40711]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 16:54:52 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 16:54:54 vmfsppjb006 setroubleshoot[40711]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 16:54:54 vmfsppjb006 platform-python[40711]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:01:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:01:37 vmfsppjb006 dbus-daemon[41118]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:01:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:01:38 vmfsppjb006 setroubleshoot[41118]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:01:39 vmfsppjb006 setroubleshoot[41118]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:01:39 vmfsppjb006 platform-python[41118]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:02:12 vmfsppjb006 python3.6[1639]: 2021-10-25T08:02:12.109612Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 17:02:56 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 17:02:56 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 17:02:56 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 17:02:56 vmfsppjb006 systemd[1]: Started Session c16 of user root.
Oct 25 17:02:56 vmfsppjb006 systemd[41283]: Reached target Timers.
Oct 25 17:02:56 vmfsppjb006 systemd[41283]: Reached target Paths.
Oct 25 17:02:56 vmfsppjb006 systemd[41283]: Starting D-Bus User Message Bus Socket.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Listening on D-Bus User Message Bus Socket.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Reached target Sockets.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Reached target Basic System.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Reached target Default.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Startup finished in 46ms.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Stopped target Default.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Stopped target Basic System.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Stopped target Timers.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Stopped target Paths.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Stopped target Sockets.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Closed D-Bus User Message Bus Socket.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Reached target Shutdown.
Oct 25 17:02:57 vmfsppjb006 systemd[41283]: Starting Exit the Session...
Oct 25 17:02:57 vmfsppjb006 systemd[1]: user@0.service: Killing process 41318 (systemctl) with signal SIGKILL.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 17:02:57 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 17:02:57 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 17:03:00 vmfsppjb006 python3.6[1639]: 2021-10-25T08:03:00.300430Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 16;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 17:03:05 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:03:05 vmfsppjb006 dbus-daemon[41337]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:03:05 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:03:06 vmfsppjb006 setroubleshoot[41337]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:03:06 vmfsppjb006 platform-python[41337]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:03:15 vmfsppjb006 setroubleshoot[41337]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:03:15 vmfsppjb006 platform-python[41337]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:03:37 vmfsppjb006 dbus-daemon[41378]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:03:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:03:38 vmfsppjb006 setroubleshoot[41378]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:03:39 vmfsppjb006 setroubleshoot[41378]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:03:39 vmfsppjb006 platform-python[41378]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:06:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:06:37 vmfsppjb006 dbus-daemon[41550]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:06:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:06:38 vmfsppjb006 setroubleshoot[41550]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:06:39 vmfsppjb006 setroubleshoot[41550]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:06:39 vmfsppjb006 platform-python[41550]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:06:44 vmfsppjb006 setroubleshoot[41550]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:06:44 vmfsppjb006 platform-python[41550]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 17:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 17:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 17:09:01 vmfsppjb006 systemd[1]: Started Session 87 of user omsagent.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Starting D-Bus User Message Bus Socket.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Reached target Timers.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Reached target Paths.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Listening on D-Bus User Message Bus Socket.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Reached target Sockets.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Reached target Basic System.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Reached target Default.
Oct 25 17:09:02 vmfsppjb006 systemd[41699]: Startup finished in 49ms.
Oct 25 17:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 17:09:04 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:09:04 vmfsppjb006 dbus-daemon[41798]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Stopped target Default.
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Stopped target Basic System.
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Stopped target Paths.
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Stopped target Sockets.
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Closed D-Bus User Message Bus Socket.
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Reached target Shutdown.
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Starting Exit the Session...
Oct 25 17:09:04 vmfsppjb006 systemd[41699]: Stopped target Timers.
Oct 25 17:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 41830 (systemctl) with signal SIGKILL.
Oct 25 17:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 17:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 17:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 17:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 17:09:04 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:09:05 vmfsppjb006 setroubleshoot[41798]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:09:05 vmfsppjb006 platform-python[41798]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:09:15 vmfsppjb006 setroubleshoot[41798]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:09:15 vmfsppjb006 platform-python[41798]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:09:37 vmfsppjb006 dbus-daemon[41877]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:09:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:09:38 vmfsppjb006 setroubleshoot[41877]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:09:39 vmfsppjb006 setroubleshoot[41877]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:09:39 vmfsppjb006 platform-python[41877]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:10:05 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:10:05 vmfsppjb006 dbus-daemon[41911]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:10:05 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:10:06 vmfsppjb006 setroubleshoot[41911]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:10:06 vmfsppjb006 platform-python[41911]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:12:34 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 17:12:34 vmfsppjb006 dnf[42062]: Metadata cache refreshed recently.
Oct 25 17:12:34 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 17:13:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:13:37 vmfsppjb006 dbus-daemon[42124]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:13:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:13:38 vmfsppjb006 setroubleshoot[42124]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:13:39 vmfsppjb006 setroubleshoot[42124]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:13:39 vmfsppjb006 platform-python[42124]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:13:47 vmfsppjb006 setroubleshoot[42124]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:13:47 vmfsppjb006 platform-python[42124]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:22:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:22:37 vmfsppjb006 dbus-daemon[42655]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:22:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:22:37 vmfsppjb006 setroubleshoot[42655]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:22:38 vmfsppjb006 setroubleshoot[42655]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:22:38 vmfsppjb006 platform-python[42655]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:22:49 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:22:49 vmfsppjb006 dbus-daemon[42676]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:22:49 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:22:50 vmfsppjb006 setroubleshoot[42676]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:22:50 vmfsppjb006 platform-python[42676]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 17:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 17:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 17:24:01 vmfsppjb006 systemd[1]: Started Session 89 of user omsagent.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Reached target Paths.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Starting D-Bus User Message Bus Socket.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Reached target Timers.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Listening on D-Bus User Message Bus Socket.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Reached target Sockets.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Reached target Basic System.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Reached target Default.
Oct 25 17:24:01 vmfsppjb006 systemd[42757]: Startup finished in 47ms.
Oct 25 17:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 17:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Stopped target Default.
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Stopped target Basic System.
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Stopped target Timers.
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Stopped target Sockets.
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Closed D-Bus User Message Bus Socket.
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Stopped target Paths.
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Reached target Shutdown.
Oct 25 17:24:04 vmfsppjb006 systemd[42757]: Starting Exit the Session...
Oct 25 17:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 42876 (systemctl) with signal SIGKILL.
Oct 25 17:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 17:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 17:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 17:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 17:24:09 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:24:09 vmfsppjb006 dbus-daemon[42886]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:24:10 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:24:11 vmfsppjb006 setroubleshoot[42886]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:24:11 vmfsppjb006 platform-python[42886]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:24:37 vmfsppjb006 dbus-daemon[42924]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:24:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:24:37 vmfsppjb006 setroubleshoot[42924]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:24:38 vmfsppjb006 setroubleshoot[42924]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:24:38 vmfsppjb006 platform-python[42924]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:25:30 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:25:30 vmfsppjb006 dbus-daemon[42983]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:25:30 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:25:31 vmfsppjb006 setroubleshoot[42983]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:25:31 vmfsppjb006 platform-python[42983]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:25:37 vmfsppjb006 setroubleshoot[42983]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:25:37 vmfsppjb006 setroubleshoot[42983]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:25:37 vmfsppjb006 platform-python[42983]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:32:58 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 17:32:58 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 17:32:58 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 17:32:58 vmfsppjb006 systemd[1]: Started Session c17 of user root.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Starting D-Bus User Message Bus Socket.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Reached target Paths.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Reached target Timers.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Listening on D-Bus User Message Bus Socket.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Reached target Sockets.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Reached target Basic System.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Reached target Default.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Startup finished in 49ms.
Oct 25 17:32:58 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 17:32:58 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 17:32:58 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Stopped target Default.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Stopped target Basic System.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Stopped target Timers.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Stopped target Paths.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Stopped target Sockets.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Closed D-Bus User Message Bus Socket.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Reached target Shutdown.
Oct 25 17:32:58 vmfsppjb006 systemd[43492]: Starting Exit the Session...
Oct 25 17:32:59 vmfsppjb006 systemd[1]: user@0.service: Killing process 43527 (systemctl) with signal SIGKILL.
Oct 25 17:32:59 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 17:32:59 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 17:32:59 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 17:32:59 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 17:32:59 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 17:32:59 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 17:33:00 vmfsppjb006 python3.6[1639]: 2021-10-25T08:33:00.649489Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 17;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 17:33:02 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:33:02 vmfsppjb006 dbus-daemon[43546]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:33:03 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:33:04 vmfsppjb006 setroubleshoot[43546]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:33:04 vmfsppjb006 platform-python[43546]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:33:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:33:37 vmfsppjb006 dbus-daemon[43593]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:33:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:33:38 vmfsppjb006 setroubleshoot[43593]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:33:38 vmfsppjb006 setroubleshoot[43593]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:33:38 vmfsppjb006 platform-python[43593]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:35:13 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:35:13 vmfsppjb006 dbus-daemon[43693]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:35:13 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:35:14 vmfsppjb006 setroubleshoot[43693]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:35:14 vmfsppjb006 platform-python[43693]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:35:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:35:37 vmfsppjb006 dbus-daemon[43719]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:35:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:35:38 vmfsppjb006 setroubleshoot[43719]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:35:38 vmfsppjb006 setroubleshoot[43719]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:35:38 vmfsppjb006 platform-python[43719]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 17:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 17:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 17:39:01 vmfsppjb006 systemd[1]: Started Session 92 of user omsagent.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Starting D-Bus User Message Bus Socket.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Reached target Paths.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Reached target Timers.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Listening on D-Bus User Message Bus Socket.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Reached target Sockets.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Reached target Basic System.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Reached target Default.
Oct 25 17:39:01 vmfsppjb006 systemd[43921]: Startup finished in 46ms.
Oct 25 17:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 17:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Stopped target Default.
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Stopped target Basic System.
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Stopped target Sockets.
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Stopped target Paths.
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Stopped target Timers.
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Closed D-Bus User Message Bus Socket.
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Reached target Shutdown.
Oct 25 17:39:03 vmfsppjb006 systemd[43921]: Starting Exit the Session...
Oct 25 17:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 44041 (systemctl) with signal SIGKILL.
Oct 25 17:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 17:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 17:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 17:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 17:39:14 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:39:14 vmfsppjb006 dbus-daemon[44062]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:39:14 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:39:15 vmfsppjb006 setroubleshoot[44062]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:39:15 vmfsppjb006 platform-python[44062]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:39:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:39:37 vmfsppjb006 dbus-daemon[44089]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:39:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:39:38 vmfsppjb006 setroubleshoot[44089]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:39:38 vmfsppjb006 setroubleshoot[44089]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:39:38 vmfsppjb006 platform-python[44089]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:40:14 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:40:14 vmfsppjb006 dbus-daemon[44134]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:40:15 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:40:16 vmfsppjb006 setroubleshoot[44134]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:40:16 vmfsppjb006 platform-python[44134]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:40:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:40:37 vmfsppjb006 dbus-daemon[44170]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:40:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:40:38 vmfsppjb006 setroubleshoot[44170]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:40:38 vmfsppjb006 setroubleshoot[44170]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:40:38 vmfsppjb006 platform-python[44170]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:45:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:45:37 vmfsppjb006 dbus-daemon[44467]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:45:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:45:38 vmfsppjb006 setroubleshoot[44467]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:45:38 vmfsppjb006 setroubleshoot[44467]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:45:38 vmfsppjb006 platform-python[44467]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 17:45:47 vmfsppjb006 setroubleshoot[44467]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:45:47 vmfsppjb006 platform-python[44467]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 17:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 17:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 17:54:01 vmfsppjb006 systemd[1]: Started Session 94 of user omsagent.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Reached target Paths.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Starting D-Bus User Message Bus Socket.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Reached target Timers.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Listening on D-Bus User Message Bus Socket.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Reached target Sockets.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Reached target Basic System.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Reached target Default.
Oct 25 17:54:02 vmfsppjb006 systemd[44946]: Startup finished in 46ms.
Oct 25 17:54:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 17:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:54:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Stopped target Default.
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Stopped target Basic System.
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Stopped target Timers.
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Stopped target Sockets.
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Closed D-Bus User Message Bus Socket.
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Stopped target Paths.
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Reached target Shutdown.
Oct 25 17:54:04 vmfsppjb006 systemd[44946]: Starting Exit the Session...
Oct 25 17:54:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 45066 (systemctl) with signal SIGKILL.
Oct 25 17:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:54:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 17:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 17:54:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 17:54:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 17:54:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 17:54:08 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:54:08 vmfsppjb006 dbus-daemon[45076]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:54:09 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:54:10 vmfsppjb006 setroubleshoot[45076]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:54:10 vmfsppjb006 platform-python[45076]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:54:29 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 17:54:29 vmfsppjb006 dbus-daemon[45108]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 17:54:29 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 17:54:30 vmfsppjb006 setroubleshoot[45108]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051. For complete SELinux messages run: sealert -l 5102c457-bc6b-4a7c-8baa-febd4dab7868
Oct 25 17:54:30 vmfsppjb006 platform-python[45108]: SELinux is preventing php-fpm from name_connect access on the tcp_socket port 10051.#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can network connect#012Then you must tell SELinux about this by enabling the 'httpd_can_network_connect' boolean.#012#012Do#012setsebool -P httpd_can_network_connect 1#012#012*****  Plugin catchall_boolean (47.5 confidence) suggests   ******************#012#012If you want to allow httpd to can connect zabbix#012Then you must tell SELinux about this by enabling the 'httpd_can_connect_zabbix' boolean.#012#012Do#012setsebool -P httpd_can_connect_zabbix 1#012#012*****  Plugin catchall (6.38 confidence) suggests   **************************#012#012If you believe that php-fpm should be allowed name_connect access on the port 10051 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'php-fpm' --raw | audit2allow -M my-phpfpm#012# semodule -X 300 -i my-phpfpm.pp#012
Oct 25 17:54:37 vmfsppjb006 setroubleshoot[45108]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 17:54:38 vmfsppjb006 setroubleshoot[45108]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 17:54:38 vmfsppjb006 platform-python[45108]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:01:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:01:37 vmfsppjb006 dbus-daemon[45532]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:01:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:01:38 vmfsppjb006 setroubleshoot[45532]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:01:39 vmfsppjb006 setroubleshoot[45532]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:01:39 vmfsppjb006 platform-python[45532]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:02:12 vmfsppjb006 python3.6[1639]: 2021-10-25T09:02:12.912121Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Started Session c18 of user root.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Starting D-Bus User Message Bus Socket.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Reached target Timers.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Reached target Paths.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Listening on D-Bus User Message Bus Socket.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Reached target Sockets.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Reached target Basic System.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Reached target Default.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Startup finished in 46ms.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Stopped target Default.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Stopped target Basic System.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Stopped target Paths.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Stopped target Sockets.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Closed D-Bus User Message Bus Socket.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Reached target Shutdown.
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Starting Exit the Session...
Oct 25 18:03:00 vmfsppjb006 systemd[45705]: Stopped target Timers.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: user@0.service: Killing process 45739 (systemctl) with signal SIGKILL.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 25 18:03:00 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 25 18:03:01 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 25 18:03:01 vmfsppjb006 python3.6[1639]: 2021-10-25T09:03:01.090175Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 18;HeartbeatId: 37B777FA-1F7D-4D6D-A4DE-D8726B8C2DC6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 25 18:03:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:03:37 vmfsppjb006 dbus-daemon[45790]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:03:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:03:38 vmfsppjb006 setroubleshoot[45790]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:03:39 vmfsppjb006 setroubleshoot[45790]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:03:39 vmfsppjb006 platform-python[45790]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:04:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:04:37 vmfsppjb006 dbus-daemon[45854]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:04:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:04:38 vmfsppjb006 setroubleshoot[45854]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:04:39 vmfsppjb006 setroubleshoot[45854]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:04:39 vmfsppjb006 platform-python[45854]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 18:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 18:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 18:09:01 vmfsppjb006 systemd[1]: Started Session 97 of user omsagent.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Reached target Paths.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Starting D-Bus User Message Bus Socket.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Reached target Timers.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Listening on D-Bus User Message Bus Socket.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Reached target Sockets.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Reached target Basic System.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Reached target Default.
Oct 25 18:09:01 vmfsppjb006 systemd[46110]: Startup finished in 48ms.
Oct 25 18:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Stopped target Default.
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Stopped target Basic System.
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Stopped target Paths.
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Stopped target Sockets.
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Closed D-Bus User Message Bus Socket.
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Reached target Shutdown.
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Starting Exit the Session...
Oct 25 18:09:04 vmfsppjb006 systemd[46110]: Stopped target Timers.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 46230 (systemctl) with signal SIGKILL.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 18:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 18:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 18:09:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:09:37 vmfsppjb006 dbus-daemon[46270]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:09:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:09:38 vmfsppjb006 setroubleshoot[46270]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:09:39 vmfsppjb006 setroubleshoot[46270]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:09:39 vmfsppjb006 platform-python[46270]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:10:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:10:37 vmfsppjb006 dbus-daemon[46344]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:10:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:10:38 vmfsppjb006 setroubleshoot[46344]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:10:39 vmfsppjb006 setroubleshoot[46344]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:10:39 vmfsppjb006 platform-python[46344]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:12:35 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 25 18:12:36 vmfsppjb006 dnf[46470]: packages-microsoft-com-prod                      14 kB/s | 3.0 kB     00:00
Oct 25 18:12:36 vmfsppjb006 dnf[46470]: MySQL 8.0 Community Server                      106 kB/s | 2.6 kB     00:00
Oct 25 18:12:37 vmfsppjb006 dnf[46470]: MySQL Connectors Community                      5.0 kB/s | 2.6 kB     00:00
Oct 25 18:12:37 vmfsppjb006 dnf[46470]: MySQL Tools Community                           278 kB/s | 2.6 kB     00:00
Oct 25 18:12:37 vmfsppjb006 dnf[46470]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.1 kB/s | 2.4 kB     00:00
Oct 25 18:12:38 vmfsppjb006 dnf[46470]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.8 kB/s | 2.8 kB     00:00
Oct 25 18:12:38 vmfsppjb006 dnf[46470]: Microsoft Azure RPMs for RHEL8 Extended Update  7.0 kB/s | 2.1 kB     00:00
Oct 25 18:12:39 vmfsppjb006 dnf[46470]: Zabbix Official Repository - x86_64              14 kB/s | 2.9 kB     00:00
Oct 25 18:12:39 vmfsppjb006 dnf[46470]: Zabbix Official Repository non-supported - x86_  13 kB/s | 3.0 kB     00:00
Oct 25 18:12:40 vmfsppjb006 dnf[46470]: Metadata cache created.
Oct 25 18:12:40 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 25 18:13:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:13:37 vmfsppjb006 dbus-daemon[46531]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:13:38 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:13:38 vmfsppjb006 setroubleshoot[46531]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:13:39 vmfsppjb006 setroubleshoot[46531]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:13:39 vmfsppjb006 platform-python[46531]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 25 18:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 25 18:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 25 18:24:01 vmfsppjb006 systemd[1]: Started Session 99 of user omsagent.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Reached target Paths.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Reached target Timers.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Starting D-Bus User Message Bus Socket.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Listening on D-Bus User Message Bus Socket.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Reached target Sockets.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Reached target Basic System.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Reached target Default.
Oct 25 18:24:01 vmfsppjb006 systemd[47146]: Startup finished in 44ms.
Oct 25 18:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Stopped target Default.
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Stopped target Basic System.
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Stopped target Sockets.
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Stopped target Paths.
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Closed D-Bus User Message Bus Socket.
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Reached target Shutdown.
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Starting Exit the Session...
Oct 25 18:24:03 vmfsppjb006 systemd[47146]: Stopped target Timers.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 47271 (systemctl) with signal SIGKILL.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 25 18:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 25 18:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 25 18:24:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:24:37 vmfsppjb006 dbus-daemon[47317]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:24:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:24:37 vmfsppjb006 setroubleshoot[47317]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:24:38 vmfsppjb006 setroubleshoot[47317]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:24:38 vmfsppjb006 platform-python[47317]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:25:37 vmfsppjb006 dbus-daemon[909]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=869 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 25 18:25:37 vmfsppjb006 dbus-daemon[47381]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 25 18:25:37 vmfsppjb006 dbus-daemon[909]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 25 18:25:37 vmfsppjb006 setroubleshoot[47381]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 25 18:25:38 vmfsppjb006 setroubleshoot[47381]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 25 18:25:38 vmfsppjb006 platform-python[47381]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 25 18:26:39 vmfsppjb006 systemd-logind[943]: Session 3 logged out. Waiting for processes to exit.
Oct 25 18:26:39 vmfsppjb006 systemd-logind[943]: Removed session 3.
Oct 25 18:26:39 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 25 18:26:39 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1000...
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Stopped target Default.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Stopped target Basic System.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Stopped target Sockets.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Closed D-Bus User Message Bus Socket.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Stopped target Paths.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Stopped target Timers.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Reached target Shutdown.
Oct 25 18:26:39 vmfsppjb006 systemd[7816]: Starting Exit the Session...
Oct 25 18:26:39 vmfsppjb006 systemd[1]: user@1000.service: Killing process 47446 (systemctl) with signal SIGKILL.
Oct 25 18:26:39 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 25 18:26:39 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1000.
Oct 25 18:26:39 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 25 18:26:39 vmfsppjb006 systemd[1]: Stopping /run/user/1000 mount wrapper...
Oct 25 18:26:39 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1000.
Oct 25 18:26:39 vmfsppjb006 systemd[1]: Stopped /run/user/1000 mount wrapper.
Oct 26 09:05:40 vmfsppjb006 kernel: Command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Oct 26 09:05:40 vmfsppjb006 kernel: x86/fpu: Enabled xstate features 0xff, context size is 2560 bytes, using 'compacted' format.
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-provided physical RAM map:
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ffeffff] usable
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003fff0000-0x000000003fffefff] ACPI data
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] ACPI NVS
Oct 26 09:05:40 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable
Oct 26 09:05:40 vmfsppjb006 kernel: printk: bootconsole [earlyser0] enabled
Oct 26 09:05:40 vmfsppjb006 kernel: NX (Execute Disable) protection: active
Oct 26 09:05:40 vmfsppjb006 kernel: SMBIOS 2.3 present.
Oct 26 09:05:40 vmfsppjb006 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008  12/07/2018
Oct 26 09:05:40 vmfsppjb006 kernel: Hypervisor detected: Microsoft Hyper-V
Oct 26 09:05:40 vmfsppjb006 kernel: Hyper-V: features 0x2e7f, hints 0x60c2c
Oct 26 09:05:40 vmfsppjb006 kernel: Hyper-V Host Build:18362-10.0-3-0.3356
Oct 26 09:05:40 vmfsppjb006 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40
Oct 26 09:05:40 vmfsppjb006 kernel: tsc: Marking TSC unstable due to running on Hyper-V
Oct 26 09:05:40 vmfsppjb006 kernel: Hyper-V: Using hypercall for remote TLB flush
Oct 26 09:05:40 vmfsppjb006 kernel: tsc: Detected 2593.906 MHz processor
Oct 26 09:05:40 vmfsppjb006 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000
Oct 26 09:05:40 vmfsppjb006 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct 26 09:05:40 vmfsppjb006 kernel: last_pfn = 0x3fff0 max_arch_pfn = 0x400000000
Oct 26 09:05:40 vmfsppjb006 kernel: found SMP MP-table at [mem 0x000ff780-0x000ff78f]
Oct 26 09:05:40 vmfsppjb006 kernel: kexec: Reserving the low 1M of memory for crashkernel
Oct 26 09:05:40 vmfsppjb006 kernel: Using GB pages for direct mapping
Oct 26 09:05:40 vmfsppjb006 kernel: RAMDISK: [mem 0x34c8a000-0x3663cfff]
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Early table checksum verification disabled
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: RSDP 0x00000000000F5C00 000014 (v00 ACPIAM)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: RSDT 0x000000003FFF0000 000040 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: FACP 0x000000003FFF0200 000081 (v02 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: DSDT 0x000000003FFF1D24 003CD5 (v01 MSFTVM MSFTVM02 00000002 INTL 02002026)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: FACS 0x000000003FFFF000 000040
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: WAET 0x000000003FFF1A80 000028 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SLIC 0x000000003FFF1AC0 000176 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: OEM0 0x000000003FFF1CC0 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SRAT 0x000000003FFF0800 000130 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: APIC 0x000000003FFF0300 00005A (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: OEMB 0x000000003FFFF040 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 26 09:05:40 vmfsppjb006 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x13fffffff] hotplug
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x140200000-0xfdfffffff] hotplug
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000200000-0x1ffffffffff] hotplug
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000200000-0x3ffffffffff] hotplug
Oct 26 09:05:40 vmfsppjb006 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x13fffffff] -> [mem 0x00000000-0x13fffffff]
Oct 26 09:05:40 vmfsppjb006 kernel: NODE_DATA(0) allocated [mem 0x13ffd6000-0x13fffffff]
Oct 26 09:05:40 vmfsppjb006 kernel: Using crashkernel=auto, the size chosen is a best effort estimation.
Oct 26 09:05:40 vmfsppjb006 kernel: Reserving 160MB of memory at 672MB for crashkernel (System RAM: 2047MB)
Oct 26 09:05:40 vmfsppjb006 kernel: Zone ranges:
Oct 26 09:05:40 vmfsppjb006 kernel:  DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct 26 09:05:40 vmfsppjb006 kernel:  DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Oct 26 09:05:40 vmfsppjb006 kernel:  Normal   [mem 0x0000000100000000-0x000000013fffffff]
Oct 26 09:05:40 vmfsppjb006 kernel:  Device   empty
Oct 26 09:05:40 vmfsppjb006 kernel: Movable zone start for each node
Oct 26 09:05:40 vmfsppjb006 kernel: Early memory node ranges
Oct 26 09:05:40 vmfsppjb006 kernel:  node   0: [mem 0x0000000000001000-0x000000000009efff]
Oct 26 09:05:40 vmfsppjb006 kernel:  node   0: [mem 0x0000000000100000-0x000000003ffeffff]
Oct 26 09:05:40 vmfsppjb006 kernel:  node   0: [mem 0x0000000100000000-0x000000013fffffff]
Oct 26 09:05:40 vmfsppjb006 kernel: Zeroed struct page in unavailable ranges: 114 pages
Oct 26 09:05:40 vmfsppjb006 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff]
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: PM-Timer IO Port: 0x408
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Oct 26 09:05:40 vmfsppjb006 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct 26 09:05:40 vmfsppjb006 kernel: Using ACPI (MADT) for SMP configuration information
Oct 26 09:05:40 vmfsppjb006 kernel: smpboot: Allowing 1 CPUs, 0 hotplug CPUs
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff]
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff]
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff]
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3fff0000-0x3fffefff]
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3ffff000-0x3fffffff]
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x40000000-0xffffffff]
Oct 26 09:05:40 vmfsppjb006 kernel: [mem 0x40000000-0xffffffff] available for PCI devices
Oct 26 09:05:40 vmfsppjb006 kernel: Booting paravirtualized kernel on bare hardware
Oct 26 09:05:40 vmfsppjb006 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct 26 09:05:40 vmfsppjb006 kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:1 nr_cpu_ids:1 nr_node_ids:1
Oct 26 09:05:40 vmfsppjb006 kernel: percpu: Embedded 53 pages/cpu s180224 r8192 d28672 u2097152
Oct 26 09:05:40 vmfsppjb006 kernel: Hyper-V: PV spinlocks enabled
Oct 26 09:05:40 vmfsppjb006 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 515824
Oct 26 09:05:40 vmfsppjb006 kernel: Policy zone: Normal
Oct 26 09:05:40 vmfsppjb006 kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 26 09:05:40 vmfsppjb006 kernel: Specific versions of hardware are certified with Red Hat Enterprise Linux 8. Please see the list of hardware certified with Red Hat Enterprise Linux 8 at https://access.redhat.com/ecosystem.
Oct 26 09:05:40 vmfsppjb006 kernel: Memory: 922868K/2096696K available (12292K kernel code, 2152K rwdata, 3852K rodata, 2408K init, 6468K bss, 324784K reserved, 0K cma-reserved)
Oct 26 09:05:40 vmfsppjb006 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Oct 26 09:05:40 vmfsppjb006 kernel: Kernel/User page tables isolation: enabled
Oct 26 09:05:40 vmfsppjb006 kernel: ftrace: allocating 36349 entries in 142 pages
Oct 26 09:05:40 vmfsppjb006 kernel: rcu: Hierarchical RCU implementation.
Oct 26 09:05:40 vmfsppjb006 kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=1.
Oct 26 09:05:40 vmfsppjb006 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct 26 09:05:40 vmfsppjb006 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
Oct 26 09:05:40 vmfsppjb006 kernel: NR_IRQS: 524544, nr_irqs: 256, preallocated irqs: 16
Oct 26 09:05:40 vmfsppjb006 kernel: random: get_random_bytes called from start_kernel+0x36b/0x55b with crng_init=0
Oct 26 09:05:40 vmfsppjb006 kernel: Console: colour VGA+ 80x25
Oct 26 09:05:40 vmfsppjb006 kernel: printk: console [tty1] enabled
Oct 26 09:05:40 vmfsppjb006 kernel: printk: console [ttyS0] enabled
Oct 26 09:05:40 vmfsppjb006 kernel: printk: bootconsole [earlyser0] disabled
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Core revision 20190703
Oct 26 09:05:40 vmfsppjb006 kernel: APIC: Switch to symmetric I/O mode setup
Oct 26 09:05:40 vmfsppjb006 kernel: Hyper-V: Using IPI hypercalls
Oct 26 09:05:40 vmfsppjb006 kernel: Hyper-V: Using MSR based APIC access
Oct 26 09:05:40 vmfsppjb006 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns
Oct 26 09:05:40 vmfsppjb006 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
Oct 26 09:05:40 vmfsppjb006 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906)
Oct 26 09:05:40 vmfsppjb006 kernel: pid_max: default: 32768 minimum: 301
Oct 26 09:05:40 vmfsppjb006 kernel: Security Framework initialized
Oct 26 09:05:40 vmfsppjb006 kernel: Yama: becoming mindful.
Oct 26 09:05:40 vmfsppjb006 kernel: SELinux:  Initializing.
Oct 26 09:05:40 vmfsppjb006 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Oct 26 09:05:40 vmfsppjb006 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Oct 26 09:05:40 vmfsppjb006 kernel: FEATURE SPEC_CTRL Not Present
Oct 26 09:05:40 vmfsppjb006 kernel: FEATURE IBPB_SUPPORT Not Present
Oct 26 09:05:40 vmfsppjb006 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct 26 09:05:40 vmfsppjb006 kernel: Spectre V2 : Mitigation: Full generic retpoline
Oct 26 09:05:40 vmfsppjb006 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct 26 09:05:40 vmfsppjb006 kernel: Speculative Store Bypass: Vulnerable
Oct 26 09:05:40 vmfsppjb006 kernel: TAA: Mitigation: Clear CPU buffers
Oct 26 09:05:40 vmfsppjb006 kernel: MDS: Mitigation: Clear CPU buffers
Oct 26 09:05:40 vmfsppjb006 kernel: Freeing SMP alternatives memory: 32K
Oct 26 09:05:40 vmfsppjb006 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7)
Oct 26 09:05:40 vmfsppjb006 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Oct 26 09:05:40 vmfsppjb006 kernel: rcu: Hierarchical SRCU implementation.
Oct 26 09:05:40 vmfsppjb006 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Oct 26 09:05:40 vmfsppjb006 kernel: smp: Bringing up secondary CPUs ...
Oct 26 09:05:40 vmfsppjb006 kernel: smp: Brought up 1 node, 1 CPU
Oct 26 09:05:40 vmfsppjb006 kernel: smpboot: Max logical packages: 1
Oct 26 09:05:40 vmfsppjb006 kernel: smpboot: Total of 1 processors activated (5187.81 BogoMIPS)
Oct 26 09:05:40 vmfsppjb006 kernel: node 0 initialised, 212261 pages in 1ms
Oct 26 09:05:40 vmfsppjb006 kernel: devtmpfs: initialized
Oct 26 09:05:40 vmfsppjb006 kernel: x86/mm: Memory block size: 128MB
Oct 26 09:05:40 vmfsppjb006 kernel: PM: Registering ACPI NVS region [mem 0x3ffff000-0x3fffffff] (4096 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct 26 09:05:40 vmfsppjb006 kernel: futex hash table entries: 256 (order: 2, 16384 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: pinctrl core: initialized pinctrl subsystem
Oct 26 09:05:40 vmfsppjb006 kernel: NET: Registered protocol family 16
Oct 26 09:05:40 vmfsppjb006 kernel: audit: initializing netlink subsys (disabled)
Oct 26 09:05:40 vmfsppjb006 kernel: cpuidle: using governor menu
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: bus type PCI registered
Oct 26 09:05:40 vmfsppjb006 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct 26 09:05:40 vmfsppjb006 kernel: PCI: Using configuration type 1 for base access
Oct 26 09:05:40 vmfsppjb006 kernel: audit: type=2000 audit(1635206737.104:1): state=initialized audit_enabled=0 res=1
Oct 26 09:05:40 vmfsppjb006 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct 26 09:05:40 vmfsppjb006 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct 26 09:05:40 vmfsppjb006 kernel: cryptd: max_cpu_qlen set to 1000
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Added _OSI(Module Device)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Device)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Interpreter enabled
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: (supports S0 S5)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Using IOAPIC for interrupt routing
Oct 26 09:05:40 vmfsppjb006 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Oct 26 09:05:40 vmfsppjb006 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Oct 26 09:05:40 vmfsppjb006 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Oct 26 09:05:40 vmfsppjb006 kernel: PCI host bridge to bus 0000:00
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0xfe0000000-0xfffffffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x40000000-0xfffbffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:00.0: [8086:7192] type 00 class 0x060000
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x010180
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.1: reg 0x20: [io  0xffa0-0xffaf]
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000
Oct 26 09:05:40 vmfsppjb006 kernel: * Found PM-Timer Bug on the chipset. Due to workarounds for a bug,#012* this clock source is slow. Consider trying other clock sources
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:07.3: quirk: [io  0x0400-0x043f] claimed by PIIX4 ACPI
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:08.0: [1414:5353] type 00 class 0x030000
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:08.0: reg 0x10: [mem 0xf8000000-0xfbffffff]
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 7 9 10 *11 12 14 15)
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 26 09:05:40 vmfsppjb006 kernel: iommu: Default domain type: Passthrough 
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: setting as boot VGA device
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: bridge control possible
Oct 26 09:05:40 vmfsppjb006 kernel: vgaarb: loaded
Oct 26 09:05:40 vmfsppjb006 kernel: SCSI subsystem initialized
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: bus type USB registered
Oct 26 09:05:40 vmfsppjb006 kernel: usbcore: registered new interface driver usbfs
Oct 26 09:05:40 vmfsppjb006 kernel: usbcore: registered new interface driver hub
Oct 26 09:05:40 vmfsppjb006 kernel: usbcore: registered new device driver usb
Oct 26 09:05:40 vmfsppjb006 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct 26 09:05:40 vmfsppjb006 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct 26 09:05:40 vmfsppjb006 kernel: PTP clock support registered
Oct 26 09:05:40 vmfsppjb006 kernel: EDAC MC: Ver: 3.0.0
Oct 26 09:05:40 vmfsppjb006 kernel: PCI: Using ACPI for IRQ routing
Oct 26 09:05:40 vmfsppjb006 kernel: NetLabel: Initializing
Oct 26 09:05:40 vmfsppjb006 kernel: NetLabel:  domain hash size = 128
Oct 26 09:05:40 vmfsppjb006 kernel: NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
Oct 26 09:05:40 vmfsppjb006 kernel: NetLabel:  unlabeled traffic allowed by default
Oct 26 09:05:40 vmfsppjb006 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page
Oct 26 09:05:40 vmfsppjb006 kernel: VFS: Disk quotas dquot_6.6.0
Oct 26 09:05:40 vmfsppjb006 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: pnp: PnP ACPI init
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:06: [io  0x01e0-0x01ef] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:06: [io  0x0160-0x016f] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:06: [io  0x0278-0x027f] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:06: [io  0x0378-0x037f] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:06: [io  0x0678-0x067f] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:06: [io  0x0778-0x077f] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:06: [io  0x04d0-0x04d1] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:07: [io  0x0400-0x043f] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:07: [io  0x0370-0x0371] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:07: [io  0x0440-0x044f] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:07: [mem 0xfec00000-0xfec00fff] could not be reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:07: [mem 0xfee00000-0xfee00fff] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:08: [mem 0x00000000-0x0009ffff] could not be reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:08: [mem 0x000c0000-0x000dffff] could not be reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:08: [mem 0x000e0000-0x000fffff] could not be reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:08: [mem 0x00100000-0x3fffffff] could not be reserved
Oct 26 09:05:40 vmfsppjb006 kernel: system 00:08: [mem 0xfffc0000-0xffffffff] has been reserved
Oct 26 09:05:40 vmfsppjb006 kernel: pnp: PnP ACPI: found 9 devices
Oct 26 09:05:40 vmfsppjb006 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: resource 4 [mem 0xfe0000000-0xfffffffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: resource 5 [io  0x0000-0x0cf7 window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: resource 6 [io  0x0d00-0xffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: resource 7 [mem 0x000a0000-0x000bffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: pci_bus 0000:00: resource 8 [mem 0x40000000-0xfffbffff window]
Oct 26 09:05:40 vmfsppjb006 kernel: NET: Registered protocol family 2
Oct 26 09:05:40 vmfsppjb006 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Oct 26 09:05:40 vmfsppjb006 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes)
Oct 26 09:05:40 vmfsppjb006 kernel: NET: Registered protocol family 1
Oct 26 09:05:40 vmfsppjb006 kernel: NET: Registered protocol family 44
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Oct 26 09:05:40 vmfsppjb006 kernel: pci 0000:00:08.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Oct 26 09:05:40 vmfsppjb006 kernel: PCI: CLS 0 bytes, default 64
Oct 26 09:05:40 vmfsppjb006 kernel: Unpacking initramfs...
Oct 26 09:05:40 vmfsppjb006 kernel: Freeing initrd memory: 26316K
Oct 26 09:05:40 vmfsppjb006 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Oct 26 09:05:40 vmfsppjb006 kernel: software IO TLB: mapped [mem 0x3bff0000-0x3fff0000] (64MB)
Oct 26 09:05:40 vmfsppjb006 kernel: Initialise system trusted keyrings
Oct 26 09:05:40 vmfsppjb006 kernel: Key type blacklist registered
Oct 26 09:05:40 vmfsppjb006 kernel: workingset: timestamp_bits=36 max_order=19 bucket_order=0
Oct 26 09:05:40 vmfsppjb006 kernel: zbud: loaded
Oct 26 09:05:40 vmfsppjb006 kernel: pstore: using deflate compression
Oct 26 09:05:40 vmfsppjb006 kernel: Platform Keyring initialized
Oct 26 09:05:40 vmfsppjb006 kernel: NET: Registered protocol family 38
Oct 26 09:05:40 vmfsppjb006 kernel: Key type asymmetric registered
Oct 26 09:05:40 vmfsppjb006 kernel: Asymmetric key parser 'x509' registered
Oct 26 09:05:40 vmfsppjb006 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246)
Oct 26 09:05:40 vmfsppjb006 kernel: io scheduler mq-deadline registered
Oct 26 09:05:40 vmfsppjb006 kernel: io scheduler kyber registered
Oct 26 09:05:40 vmfsppjb006 kernel: io scheduler bfq registered
Oct 26 09:05:40 vmfsppjb006 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE
Oct 26 09:05:40 vmfsppjb006 kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
Oct 26 09:05:40 vmfsppjb006 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
Oct 26 09:05:40 vmfsppjb006 kernel: ACPI: Power Button [PWRF]
Oct 26 09:05:40 vmfsppjb006 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct 26 09:05:40 vmfsppjb006 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct 26 09:05:40 vmfsppjb006 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Oct 26 09:05:40 vmfsppjb006 kernel: Non-volatile memory driver v1.3
Oct 26 09:05:40 vmfsppjb006 kernel: rdac: device handler registered
Oct 26 09:05:40 vmfsppjb006 kernel: hp_sw: device handler registered
Oct 26 09:05:40 vmfsppjb006 kernel: emc: device handler registered
Oct 26 09:05:40 vmfsppjb006 kernel: alua: device handler registered
Oct 26 09:05:40 vmfsppjb006 kernel: libphy: Fixed MDIO Bus: probed
Oct 26 09:05:40 vmfsppjb006 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Oct 26 09:05:40 vmfsppjb006 kernel: ehci-pci: EHCI PCI platform driver
Oct 26 09:05:40 vmfsppjb006 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Oct 26 09:05:40 vmfsppjb006 kernel: ohci-pci: OHCI PCI platform driver
Oct 26 09:05:40 vmfsppjb006 kernel: uhci_hcd: USB Universal Host Controller Interface driver
Oct 26 09:05:40 vmfsppjb006 kernel: usbcore: registered new interface driver usbserial_generic
Oct 26 09:05:40 vmfsppjb006 kernel: usbserial: USB Serial support registered for generic
Oct 26 09:05:40 vmfsppjb006 kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12
Oct 26 09:05:40 vmfsppjb006 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Oct 26 09:05:40 vmfsppjb006 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Oct 26 09:05:40 vmfsppjb006 kernel: mousedev: PS/2 mouse device common for all mice
Oct 26 09:05:40 vmfsppjb006 kernel: rtc_cmos 00:00: RTC can wake from S4
Oct 26 09:05:40 vmfsppjb006 kernel: rtc_cmos 00:00: registered as rtc0
Oct 26 09:05:40 vmfsppjb006 kernel: rtc_cmos 00:00: alarms up to one month, 114 bytes nvram
Oct 26 09:05:40 vmfsppjb006 kernel: intel_pstate: CPU model not supported
Oct 26 09:05:40 vmfsppjb006 kernel: hidraw: raw HID events driver (C) Jiri Kosina
Oct 26 09:05:40 vmfsppjb006 kernel: usbcore: registered new interface driver usbhid
Oct 26 09:05:40 vmfsppjb006 kernel: usbhid: USB HID core driver
Oct 26 09:05:40 vmfsppjb006 kernel: drop_monitor: Initializing network drop monitor service
Oct 26 09:05:40 vmfsppjb006 kernel: Initializing XFRM netlink socket
Oct 26 09:05:40 vmfsppjb006 kernel: NET: Registered protocol family 10
Oct 26 09:05:40 vmfsppjb006 kernel: Segment Routing with IPv6
Oct 26 09:05:40 vmfsppjb006 kernel: NET: Registered protocol family 17
Oct 26 09:05:40 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1
Oct 26 09:05:40 vmfsppjb006 kernel: mpls_gso: MPLS GSO support
Oct 26 09:05:40 vmfsppjb006 kernel: core: Using 1 MCE banks
Oct 26 09:05:40 vmfsppjb006 kernel: AVX2 version of gcm_enc/dec engaged.
Oct 26 09:05:40 vmfsppjb006 kernel: AES CTR mode by8 optimization enabled
Oct 26 09:05:40 vmfsppjb006 kernel: registered taskstats version 1
Oct 26 09:05:40 vmfsppjb006 kernel: Loading compiled-in X.509 certificates
Oct 26 09:05:40 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 6510a14606da3bfa607738428a62729c5d677293'
Oct 26 09:05:40 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80'
Oct 26 09:05:40 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8'
Oct 26 09:05:40 vmfsppjb006 kernel: zswap: loaded using pool lzo/zbud
Oct 26 09:05:40 vmfsppjb006 kernel: Key type big_key registered
Oct 26 09:05:40 vmfsppjb006 kernel: Key type encrypted registered
Oct 26 09:05:40 vmfsppjb006 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct 26 09:05:40 vmfsppjb006 kernel: ima: Allocated hash algorithm: sha1
Oct 26 09:05:40 vmfsppjb006 kernel: evm: Initialising EVM extended attributes:
Oct 26 09:05:40 vmfsppjb006 kernel: evm: security.selinux
Oct 26 09:05:40 vmfsppjb006 kernel: evm: security.ima
Oct 26 09:05:40 vmfsppjb006 kernel: evm: security.capability
Oct 26 09:05:40 vmfsppjb006 kernel: evm: HMAC attrs: 0x1
Oct 26 09:05:40 vmfsppjb006 kernel: rtc_cmos 00:00: setting system clock to 2021-10-26 00:05:39 UTC (1635206739)
Oct 26 09:05:40 vmfsppjb006 kernel: Unstable clock detected, switching default tracing clock to "global"#012If you want to keep using the local clock, then add:#012  "trace_clock=local"#012on the kernel command line
Oct 26 09:05:40 vmfsppjb006 kernel: Freeing unused decrypted memory: 2040K
Oct 26 09:05:40 vmfsppjb006 kernel: Freeing unused kernel memory: 2408K
Oct 26 09:05:40 vmfsppjb006 kernel: Write protecting the kernel read-only data: 18432k
Oct 26 09:05:40 vmfsppjb006 kernel: Freeing unused kernel memory: 2020K
Oct 26 09:05:40 vmfsppjb006 kernel: Freeing unused kernel memory: 244K
Oct 26 09:05:40 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Running in initial RAM disk.
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Set hostname to <pkrvmlk3jhumuhr>.
Oct 26 09:05:40 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Listening on udev Control Socket.
Oct 26 09:05:40 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Listening on Journal Socket (/dev/log).
Oct 26 09:05:40 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Reached target Timers.
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Reached target Swap.
Oct 26 09:05:40 vmfsppjb006 systemd[1]: Reached target Slices.
Oct 26 09:05:40 vmfsppjb006 kernel: psmouse serio1: trackpoint: failed to get extended button data, assuming 3 buttons
Oct 26 09:05:40 vmfsppjb006 systemd-journald[262]: Journal started
Oct 26 09:05:40 vmfsppjb006 systemd-journald[262]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 26 09:05:40 vmfsppjb006 rngd[268]: Initializing available sources
Oct 26 09:05:40 vmfsppjb006 rngd[268]: Failed to init entropy source hwrng
Oct 26 09:05:40 vmfsppjb006 rngd[268]: Enabling RDSEED rng support
Oct 26 09:05:40 vmfsppjb006 rngd[268]: Initializing entropy source rdrand
Oct 26 09:05:41 vmfsppjb006 systemd[1]: Started Apply Kernel Variables.
Oct 26 09:05:41 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 26 09:05:41 vmfsppjb006 systemd[1]: Starting Create Static Device Nodes in /dev...
Oct 26 09:05:41 vmfsppjb006 systemd[1]: Started Create Static Device Nodes in /dev.
Oct 26 09:05:42 vmfsppjb006 kernel: random: fast init done
Oct 26 09:05:42 vmfsppjb006 systemd[1]: Started Setup Virtual Console.
Oct 26 09:05:42 vmfsppjb006 systemd[1]: Starting dracut cmdline hook...
Oct 26 09:05:42 vmfsppjb006 dracut-cmdline[280]: dracut-8.2 (Ootpa) dracut-049-70.git20200228.el8
Oct 26 09:05:42 vmfsppjb006 dracut-cmdline[280]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 26 09:05:42 vmfsppjb006 systemd[1]: Started dracut cmdline hook.
Oct 26 09:05:42 vmfsppjb006 systemd[1]: Starting dracut pre-udev hook...
Oct 26 09:05:42 vmfsppjb006 kernel: device-mapper: uevent: version 1.0.3
Oct 26 09:05:42 vmfsppjb006 kernel: device-mapper: ioctl: 4.39.0-ioctl (2018-04-03) initialised: dm-devel@redhat.com
Oct 26 09:05:42 vmfsppjb006 systemd[1]: Started dracut pre-udev hook.
Oct 26 09:05:42 vmfsppjb006 systemd[1]: Starting udev Kernel Device Manager...
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Starting udev Coldplug all Devices...
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Mounting Kernel Configuration File System...
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Mounted Kernel Configuration File System.
Oct 26 09:05:43 vmfsppjb006 kernel: psmouse serio1: trackpoint: IBM TrackPoint firmware: 0x01, buttons: 3/3
Oct 26 09:05:43 vmfsppjb006 kernel: input: TPPS/2 IBM TrackPoint as /devices/platform/i8042/serio1/input/input3
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Started udev Coldplug all Devices.
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 26 09:05:43 vmfsppjb006 systemd[1]: Starting dracut initqueue hook...
Oct 26 09:05:43 vmfsppjb006 kernel: hv_vmbus: Vmbus version:4.0
Oct 26 09:05:43 vmfsppjb006 systemd-udevd[417]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 26 09:05:43 vmfsppjb006 kernel: hv_vmbus: Unknown GUID: c376c1c3-d276-48d2-90a9-c04748072c60
Oct 26 09:05:43 vmfsppjb006 kernel: hv_vmbus: registering driver hid_hyperv
Oct 26 09:05:43 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_keyboard
Oct 26 09:05:43 vmfsppjb006 kernel: hv_vmbus: registering driver hv_storvsc
Oct 26 09:05:43 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:07/VMBUS:01/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio2/input/input4
Oct 26 09:05:43 vmfsppjb006 kernel: scsi host0: storvsc_host_t
Oct 26 09:05:43 vmfsppjb006 kernel: scsi 0:0:0:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 26 09:05:43 vmfsppjb006 kernel: scsi host1: storvsc_host_t
Oct 26 09:05:43 vmfsppjb006 kernel: scsi 1:0:1:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 26 09:05:43 vmfsppjb006 kernel: scsi host2: storvsc_host_t
Oct 26 09:05:43 vmfsppjb006 kernel: scsi host3: storvsc_host_t
Oct 26 09:05:43 vmfsppjb006 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input5
Oct 26 09:05:43 vmfsppjb006 kernel: hv_vmbus: registering driver hv_netvsc
Oct 26 09:05:43 vmfsppjb006 kernel: ata_piix 0000:00:07.1: Hyper-V Virtual Machine detected, ATA device ignore set
Oct 26 09:05:43 vmfsppjb006 kernel: hid-generic 0006:045E:0621.0001: input: <UNKNOWN> HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on 
Oct 26 09:05:43 vmfsppjb006 kernel: scsi 1:0:1:0: Attached scsi generic sg0 type 0
Oct 26 09:05:43 vmfsppjb006 kernel: scsi host4: ata_piix
Oct 26 09:05:43 vmfsppjb006 kernel: scsi host5: ata_piix
Oct 26 09:05:43 vmfsppjb006 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0xffa0 irq 14
Oct 26 09:05:43 vmfsppjb006 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0xffa8 irq 15
Oct 26 09:05:43 vmfsppjb006 kernel: scsi 0:0:0:0: Attached scsi generic sg1 type 0
Oct 26 09:05:43 vmfsppjb006 kernel: sd 1:0:1:0: [sda] 8388608 512-byte logical blocks: (4.29 GB/4.00 GiB)
Oct 26 09:05:43 vmfsppjb006 kernel: sd 1:0:1:0: [sda] 4096-byte physical blocks
Oct 26 09:05:43 vmfsppjb006 kernel: sd 1:0:1:0: [sda] Write Protect is off
Oct 26 09:05:43 vmfsppjb006 kernel: sd 1:0:1:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA
Oct 26 09:05:43 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] 134217728 512-byte logical blocks: (68.7 GB/64.0 GiB)
Oct 26 09:05:43 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks
Oct 26 09:05:43 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] Write Protect is off
Oct 26 09:05:43 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA
Oct 26 09:05:43 vmfsppjb006 kernel: sda: sda1
Oct 26 09:05:43 vmfsppjb006 kernel: sdb: sdb1 sdb2 sdb14 sdb15
Oct 26 09:05:43 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk
Oct 26 09:05:43 vmfsppjb006 kernel: sd 1:0:1:0: [sda] Attached SCSI disk
Oct 26 09:05:43 vmfsppjb006 systemd-udevd[419]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 26 09:05:44 vmfsppjb006 rngd[268]: Initializing AES buffer
Oct 26 09:05:44 vmfsppjb006 rngd[268]: Enabling JITTER rng support
Oct 26 09:05:44 vmfsppjb006 rngd[268]: Initializing entropy source jitter
Oct 26 09:05:44 vmfsppjb006 kernel: random: crng init done
Oct 26 09:05:44 vmfsppjb006 kernel: random: 7 urandom warning(s) missed due to ratelimiting
Oct 26 09:05:46 vmfsppjb006 dracut-initqueue[422]: Scanning devices sdb2  for LVM volume groups
Oct 26 09:05:46 vmfsppjb006 dracut-initqueue[422]: Found volume group "rootvg" using metadata type lvm2
Oct 26 09:05:46 vmfsppjb006 dracut-initqueue[422]: 5 logical volume(s) in volume group "rootvg" now active
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Found device /dev/mapper/rootvg-rootlv.
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Started dracut initqueue hook.
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Reached target Remote File Systems (Pre).
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Reached target Remote File Systems.
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Reached target Initrd Root Device.
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Starting File System Check on /dev/mapper/rootvg-rootlv...
Oct 26 09:05:46 vmfsppjb006 systemd-fsck[555]: /usr/sbin/fsck.xfs: XFS file system.
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Started File System Check on /dev/mapper/rootvg-rootlv.
Oct 26 09:05:46 vmfsppjb006 systemd[1]: Mounting /sysroot...
Oct 26 09:05:46 vmfsppjb006 kernel: SGI XFS with ACLs, security attributes, no debug enabled
Oct 26 09:05:46 vmfsppjb006 kernel: XFS (dm-4): Mounting V5 Filesystem
Oct 26 09:05:47 vmfsppjb006 kernel: XFS (dm-4): Ending clean mount
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Mounted /sysroot.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Reached target Initrd Root File System.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Starting Reload Configuration from the Real Root...
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Reloading.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Mounting /sysroot/usr...
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Started Reload Configuration from the Real Root.
Oct 26 09:05:47 vmfsppjb006 kernel: XFS (dm-1): Mounting V5 Filesystem
Oct 26 09:05:47 vmfsppjb006 kernel: XFS (dm-1): Ending clean mount
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Mounted /sysroot/usr.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Reached target Initrd File Systems.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Reached target Initrd Default Target.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Starting dracut pre-pivot and cleanup hook...
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Started dracut pre-pivot and cleanup hook.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Starting Cleaning Up and Shutting Down Daemons...
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Stopped target Timers.
Oct 26 09:05:47 vmfsppjb006 systemd[1]: Stopped dracut pre-pivot and cleanup hook.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Remote File Systems.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Remote File Systems (Pre).
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped dracut initqueue hook.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Initrd Default Target.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Initrd Root Device.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Basic System.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Paths.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Slices.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target System Initialization.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopping udev Kernel Device Manager...
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped udev Coldplug all Devices.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Swap.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Sockets.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped Create Volatile Files and Directories.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped target Local File Systems.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped Apply Kernel Variables.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped udev Kernel Device Manager.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Started Cleaning Up and Shutting Down Daemons.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon...
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped Create Static Device Nodes in /dev.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped Create list of required static device nodes for the current kernel.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped dracut pre-udev hook.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped dracut cmdline hook.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Closed udev Control Socket.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Closed udev Kernel Socket.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Starting Cleanup udevd DB...
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Started Cleanup udevd DB.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Reached target Switch Root.
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Starting Switch Root...
Oct 26 09:05:48 vmfsppjb006 systemd[1]: Switching root.
Oct 26 09:05:48 vmfsppjb006 systemd-journald[262]: Journal stopped
Oct 26 09:05:51 vmfsppjb006 systemd-journald[262]: Received SIGTERM from PID 1 (systemd).
Oct 26 09:05:51 vmfsppjb006 kernel: printk: systemd: 14 output lines suppressed due to ratelimiting
Oct 26 09:05:51 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 26 09:05:51 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 26 09:05:51 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 26 09:05:51 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 26 09:05:51 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 26 09:05:51 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 26 09:05:51 vmfsppjb006 kernel: audit: type=1403 audit(1635206749.573:2): auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Successfully loaded SELinux policy in 1.107253s.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Relabelled /dev, /run and /sys/fs/cgroup in 19.698ms.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Set hostname to <vmfsppjb006>.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Stopped Switch Root.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: systemd-journald.service: Service has no hold-off time (RestartSec=0), scheduling restart.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Stopped Journal Service.
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Starting Journal Service...
Oct 26 09:05:51 vmfsppjb006 systemd[1]: Started Forward Password Requests to Wall Directory Watch.
Oct 26 09:05:51 vmfsppjb006 systemd-journald[690]: Journal started
Oct 26 09:05:51 vmfsppjb006 systemd-journald[690]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 26 09:05:51 vmfsppjb006 systemd[700]: systemd-resolved.service: Failed at step NAMESPACE spawning /usr/lib/systemd/systemd-resolved: Read-only file system
Oct 26 09:05:51 vmfsppjb006 systemd-tmpfiles[714]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 26 09:05:51 vmfsppjb006 systemd-tmpfiles[714]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 26 09:05:52 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 26 09:05:52 vmfsppjb006 systemd-resolved[713]: Positive Trust Anchors:
Oct 26 09:05:52 vmfsppjb006 systemd-resolved[713]: . IN DS 19036 8 2 49aac11d7b6f6446702e54a1607371607a1a41855200fd2ce1cdde32f24e8fb5
Oct 26 09:05:52 vmfsppjb006 systemd-resolved[713]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct 26 09:05:52 vmfsppjb006 systemd-resolved[713]: Negative trust anchors: 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct 26 09:05:52 vmfsppjb006 systemd-resolved[713]: Using system hostname 'vmfsppjb006'.
Oct 26 09:05:52 vmfsppjb006 systemd[1]: Started Network Name Resolution.
Oct 26 09:05:52 vmfsppjb006 systemd[1]: Reached target Host and Network Name Lookups.
Oct 26 09:05:52 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_fb
Oct 26 09:05:52 vmfsppjb006 kernel: piix4_smbus 0000:00:07.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr
Oct 26 09:05:52 vmfsppjb006 kernel: hv_vmbus: registering driver hv_balloon
Oct 26 09:05:52 vmfsppjb006 kernel: hv_utils: Registering HyperV Utility Driver
Oct 26 09:05:52 vmfsppjb006 kernel: hv_vmbus: registering driver hv_utils
Oct 26 09:05:52 vmfsppjb006 kernel: hyperv_fb: Screen resolution: 1152x864, Color depth: 32
Oct 26 09:05:52 vmfsppjb006 kernel: hv_utils: Heartbeat IC version 3.0
Oct 26 09:05:52 vmfsppjb006 kernel: hv_utils: Shutdown IC version 3.0
Oct 26 09:05:52 vmfsppjb006 kernel: hv_utils: TimeSync IC version 4.0
Oct 26 09:05:53 vmfsppjb006 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0
Oct 26 09:05:53 vmfsppjb006 kernel: Console: switching to colour frame buffer device 144x54
Oct 26 09:05:53 vmfsppjb006 systemd-udevd[721]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 26 09:05:53 vmfsppjb006 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Oct 26 09:05:53 vmfsppjb006 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6
Oct 26 09:05:53 vmfsppjb006 systemd-udevd[718]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Found device Virtual_Disk Temporary_Storage.
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Created slice system-lvm2\x2dpvscan.slice.
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Starting LVM event activation on device 8:18...
Oct 26 09:05:53 vmfsppjb006 lvm[754]:  pvscan[754] PV /dev/sdb2 online, VG rootvg is complete.
Oct 26 09:05:53 vmfsppjb006 lvm[754]:  pvscan[754] VG rootvg run autoactivation.
Oct 26 09:05:53 vmfsppjb006 lvm[754]:  PVID uevLg0-eCem-PQIV-0lUJ-ViuH-BQPi-C4PSIo read from /dev/sdb2 last written to /dev/sda2.
Oct 26 09:05:53 vmfsppjb006 lvm[754]:  pvscan[754] VG rootvg not using quick activation.
Oct 26 09:05:53 vmfsppjb006 lvm[704]:  5 logical volume(s) in volume group "rootvg" monitored
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling.
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Reached target Local File Systems (Pre).
Oct 26 09:05:53 vmfsppjb006 lvm[754]:  5 logical volume(s) in volume group "rootvg" now active
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Mounting /boot...
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/by-uuid/F405-5B51...
Oct 26 09:05:53 vmfsppjb006 kernel: XFS (sdb1): Mounting V5 Filesystem
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Mounting /var...
Oct 26 09:05:53 vmfsppjb006 systemd-fsck[778]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Mounting /home...
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Mounting /tmp...
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Started LVM event activation on device 8:18.
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 26 09:05:53 vmfsppjb006 kernel: XFS (dm-3): Mounting V5 Filesystem
Oct 26 09:05:53 vmfsppjb006 kernel: XFS (dm-2): Mounting V5 Filesystem
Oct 26 09:05:53 vmfsppjb006 systemd-fsck[783]: fsck.fat 4.1 (2017-01-24)
Oct 26 09:05:53 vmfsppjb006 systemd-fsck[783]: /dev/sdb15: 13 files, 883/63325 clusters
Oct 26 09:05:53 vmfsppjb006 kernel: XFS (dm-0): Mounting V5 Filesystem
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/by-uuid/F405-5B51.
Oct 26 09:05:53 vmfsppjb006 kernel: XFS (dm-2): Ending clean mount
Oct 26 09:05:53 vmfsppjb006 systemd[1]: Mounted /home.
Oct 26 09:05:54 vmfsppjb006 kernel: XFS (dm-0): Ending clean mount
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Mounted /tmp.
Oct 26 09:05:54 vmfsppjb006 kernel: XFS (dm-3): Ending clean mount
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Mounted /var.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Starting Load/Save Random Seed...
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Starting Flush Journal to Persistent Storage...
Oct 26 09:05:54 vmfsppjb006 systemd-journald[690]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 26 09:05:54 vmfsppjb006 kernel: XFS (sdb1): Ending clean mount
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Started Load/Save Random Seed.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Mounted /boot.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Started Flush Journal to Persistent Storage.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Mounting /boot/efi...
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Mounted /boot/efi.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Reached target Local File Systems.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Starting Restore /run/initramfs on shutdown...
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Starting Import network configuration from initramfs...
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Started Restore /run/initramfs on shutdown.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Started Import network configuration from initramfs.
Oct 26 09:05:54 vmfsppjb006 systemd[1]: Starting Create Volatile Files and Directories...
Oct 26 09:05:54 vmfsppjb006 systemd-tmpfiles[851]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 26 09:05:55 vmfsppjb006 systemd-tmpfiles[851]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting Security Auditing Service...
Oct 26 09:05:55 vmfsppjb006 auditd[854]: audit dispatcher initialized with q_depth=400 and 1 active plugins
Oct 26 09:05:55 vmfsppjb006 auditd[854]: Init complete, auditd 3.0 listening for events (startup state enable)
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: /sbin/augenrules: No change
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: No rules
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: enabled 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: failure 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: pid 854
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: rate_limit 0
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog_limit 8192
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: lost 0
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog_wait_time 60000
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: enabled 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: failure 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: pid 854
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: rate_limit 0
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog_limit 8192
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: lost 0
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog_wait_time 60000
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: enabled 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: failure 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: pid 854
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: rate_limit 0
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog_limit 8192
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: lost 0
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog 1
Oct 26 09:05:55 vmfsppjb006 augenrules[859]: backlog_wait_time 60000
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started Security Auditing Service.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting Update UTMP about System Boot/Shutdown...
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started Update UTMP about System Boot/Shutdown.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started dnf makecache --timer.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started daily update of the root trust anchor for DNSSEC.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Listening on D-Bus System Message Bus Socket.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (pre-networking)...
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Reached target Sockets.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started Daily Cleanup of Temporary Directories.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Reached target Timers.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started Machine Check Exception Logging Daemon.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting Hardware RNG Entropy Gatherer Wake threshold service...
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting Authorization Manager...
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting System Security Services Daemon...
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started irqbalance daemon.
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting Netfilter Tables...
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Started D-Bus System Message Bus.
Oct 26 09:05:55 vmfsppjb006 /usr/sbin/irqbalance[886]: Balancing is ineffective on systems with a single cpu.  Shutting down
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Starting VDO volume services...
Oct 26 09:05:55 vmfsppjb006 systemd[1]: Reached target sshd-keygen.target.
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Started Self Monitoring and Reporting Technology (SMART) Daemon.
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Started libstoragemgmt plug-in server daemon.
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Starting NTP client/server...
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Wake threshold service.
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Starting update of the root trust anchor for DNSSEC validation in unbound...
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon.
Oct 26 09:05:56 vmfsppjb006 chronyd[900]: chronyd version 3.5 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 +DEBUG)
Oct 26 09:05:56 vmfsppjb006 smartd[892]: smartd 6.6 2017-11-05 r4594 [x86_64-linux-4.18.0-193.47.1.el8_2.x86_64] (local build)
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Copyright (C) 2002-17, Bruce Allen, Christian Franke, www.smartmontools.org
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Opened configuration file /etc/smartmontools/smartd.conf
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Device: /dev/sda, opened
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Device: /dev/sda, [Msft     Virtual Disk     1.0 ], lu id: 0x600224806c22385ace52752ce8c88178, 4.29 GB
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Device: /dev/sdb, opened
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Device: /dev/sdb, [Msft     Virtual Disk     1.0 ], lu id: 0x600224809c49d3a7764b86f8bc8c4cd0, 68.7 GB
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Device: /dev/sdb, Bad IEC (SMART) mode page, err=5, skip device
Oct 26 09:05:56 vmfsppjb006 smartd[892]: Monitoring 0 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices
Oct 26 09:05:56 vmfsppjb006 chronyd[900]: Frequency -18.960 +/- 0.027 ppm read from /var/lib/chrony/drift
Oct 26 09:05:56 vmfsppjb006 chronyd[900]: Using right/UTC timezone to obtain leap second data
Oct 26 09:05:56 vmfsppjb006 systemd-resolved[713]: request_name_destroy_callback n_ref=1
Oct 26 09:05:56 vmfsppjb006 polkitd[882]: Started polkitd version 0.115
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Started Netfilter Tables.
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Started NTP client/server.
Oct 26 09:05:56 vmfsppjb006 rngd[899]: Initializing available sources
Oct 26 09:05:56 vmfsppjb006 rngd[899]: Failed to init entropy source hwrng
Oct 26 09:05:56 vmfsppjb006 rngd[899]: Enabling RDSEED rng support
Oct 26 09:05:56 vmfsppjb006 rngd[899]: Initializing entropy source rdrand
Oct 26 09:05:56 vmfsppjb006 systemd[1]: Started update of the root trust anchor for DNSSEC validation in unbound.
Oct 26 09:05:57 vmfsppjb006 sssd[883]: Starting up
Oct 26 09:05:57 vmfsppjb006 systemd[1]: Started Authorization Manager.
Oct 26 09:05:57 vmfsppjb006 systemd[1]: Starting firewalld - dynamic firewall daemon...
Oct 26 09:05:57 vmfsppjb006 sssd[be[implicit_files]][920]: Starting up
Oct 26 09:05:57 vmfsppjb006 sssd[nss][924]: Starting up
Oct 26 09:05:57 vmfsppjb006 systemd[1]: Started VDO volume services.
Oct 26 09:05:58 vmfsppjb006 systemd[1]: Started System Security Services Daemon.
Oct 26 09:05:58 vmfsppjb006 systemd[1]: Reached target User and Group Name Lookups.
Oct 26 09:05:58 vmfsppjb006 systemd[1]: Starting Login Service...
Oct 26 09:05:59 vmfsppjb006 systemd-logind[931]: New seat seat0.
Oct 26 09:05:59 vmfsppjb006 systemd-logind[931]: Watching system buttons on /dev/input/event0 (Power Button)
Oct 26 09:05:59 vmfsppjb006 systemd-logind[931]: Watching system buttons on /dev/input/event4 (AT Translated Set 2 keyboard)
Oct 26 09:05:59 vmfsppjb006 systemd-logind[931]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard)
Oct 26 09:05:59 vmfsppjb006 systemd[1]: Started Login Service.
Oct 26 09:05:59 vmfsppjb006 systemd[1]: Started firewalld - dynamic firewall daemon.
Oct 26 09:05:59 vmfsppjb006 firewalld[923]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future release. Please consider disabling it now.
Oct 26 09:06:00 vmfsppjb006 cloud-init[909]: Cloud-init v. 19.4 running 'init-local' at Tue, 26 Oct 2021 00:05:59 +0000. Up 20.65 seconds.
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Started Initial cloud-init job (pre-networking).
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Reached target Network (Pre).
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting Network Manager...
Oct 26 09:06:00 vmfsppjb006 NetworkManager[1048]: <info>  [1635206760.3863] NetworkManager (version 1.22.8-7.el8_2) is starting... (for the first time)
Oct 26 09:06:00 vmfsppjb006 NetworkManager[1048]: <info>  [1635206760.3893] Read config: /etc/NetworkManager/NetworkManager.conf
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Started Network Manager.
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Reached target Network.
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting Jobarranger Agent...
Oct 26 09:06:00 vmfsppjb006 NetworkManager[1048]: <info>  [1635206760.4164] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager"
Oct 26 09:06:00 vmfsppjb006 NetworkManager[1048]: <info>  [1635206760.4213] manager[0x5627ed1a5090]: monitoring kernel firmware directory '/lib/firmware'.
Oct 26 09:06:00 vmfsppjb006 dbus-daemon[889]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.10' (uid=0 pid=1048 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting Dynamic System Tuning Daemon...
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting MySQL Server...
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting The PHP FastCGI Process Manager...
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting The Apache HTTP Server...
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Started Hyper-V KVP daemon.
Oct 26 09:06:00 vmfsppjb006 KVP[1061]: KVP starting; pid is:1061
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting Enable periodic update of entitlement certificates....
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting Network Manager Wait Online...
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Started Enable periodic update of entitlement certificates..
Oct 26 09:06:00 vmfsppjb006 KVP[1061]: KVP LIC Version: 3.1
Oct 26 09:06:00 vmfsppjb006 kernel: hv_utils: KVP IC version 4.0
Oct 26 09:06:00 vmfsppjb006 systemd[1]: Starting Hostname Service...
Oct 26 09:06:00 vmfsppjb006 systemd[1]: jobarg-agentd.service: Can't open PID file /run/jobarranger/jobarg_agentd.pid (yet?) after start: No such file or directory
Oct 26 09:06:01 vmfsppjb006 systemd[1]: Started Jobarranger Agent.
Oct 26 09:06:01 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 26 09:06:01 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 26 09:06:02 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.freedesktop.hostname1'
Oct 26 09:06:02 vmfsppjb006 systemd[1]: Started Hostname Service.
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1586] hostname: hostname: using hostnamed
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1588] hostname: hostname changed from (none) to "vmfsppjb006"
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1591] dns-mgr[0x5627ed189250]: init: dns=default,systemd-resolved rc-manager=symlink
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1649] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-device-plugin-team.so)
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1651] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1655] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1659] manager: Networking is enabled by state file
Oct 26 09:06:02 vmfsppjb006 dbus-daemon[889]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.10' (uid=0 pid=1048 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1672] dhcp-init: Using DHCP client 'dhclient'
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1717] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-settings-plugin-ifcfg-rh.so")
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1719] settings: Loaded settings plugin: keyfile (internal)
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1889] device (lo): carrier: link connected
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1904] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Oct 26 09:06:02 vmfsppjb006 systemd[1]: Starting Network Manager Script Dispatcher Service...
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.1990] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2)
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.2132] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external')
Oct 26 09:06:02 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 26 09:06:02 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 26 09:06:02 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct 26 09:06:02 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Oct 26 09:06:02 vmfsppjb006 systemd[1]: Started Network Manager Script Dispatcher Service.
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.2827] device (eth0): carrier: link connected
Oct 26 09:06:02 vmfsppjb006 systemd[1]: Started Dynamic System Tuning Daemon.
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.3329] device (eth0): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed')
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.3335] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.3341] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.3342] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed')
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.3344] manager: NetworkManager state is now CONNECTING
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.3345] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed')
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.6395] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed')
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.6402] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds)
Oct 26 09:06:02 vmfsppjb006 NetworkManager[1048]: <info>  [1635206762.7001] dhcp4 (eth0): dhclient started with pid 1284
Oct 26 09:06:02 vmfsppjb006 rngd[899]: Initializing AES buffer
Oct 26 09:06:02 vmfsppjb006 rngd[899]: Enabling JITTER rng support
Oct 26 09:06:03 vmfsppjb006 dhclient[1284]: DHCPREQUEST on eth0 to 255.255.255.255 port 67 (xid=0x24298232)
Oct 26 09:06:03 vmfsppjb006 dhclient[1284]: DHCPACK from 168.63.129.16 (xid=0x24298232)
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4059] dhcp4 (eth0):   address 10.30.70.10
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4060] dhcp4 (eth0):   plen 27 (255.255.255.224)
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4060] dhcp4 (eth0):   classless static route 168.63.129.16/32 gw 10.30.70.1
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4060] dhcp4 (eth0):   classless static route 169.254.169.254/32 gw 10.30.70.1
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4060] dhcp4 (eth0):   gateway 10.30.70.1
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4060] dhcp4 (eth0):   lease time 4294967295
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4060] dhcp4 (eth0):   nameserver '168.63.129.16'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0):   domain name 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option broadcast_address    => '10.30.70.31'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option dad_wait_time        => '0'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option dhcp_lease_time      => '4294967295'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option dhcp_message_type    => '5'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option dhcp_rebinding_time  => '4294967295'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option dhcp_renewal_time    => '4294967295'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option dhcp_server_identifier => '168.63.129.16'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option domain_name          => 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option domain_name_servers  => '168.63.129.16'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option expiry               => '5930174058'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4061] dhcp4 (eth0): option ip_address           => '10.30.70.10'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option network_number       => '10.30.70.0'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option next_server          => '168.63.129.16'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option private_245          => 'a8:3f:81:10'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_broadcast_address => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_classless_static_routes => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_domain_name => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_domain_name_servers => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_domain_search => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_host_name  => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_interface_mtu => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_ms_classless_static_routes => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_nis_domain => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_nis_servers => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_ntp_servers => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_rfc3442_classless_static_routes => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4062] dhcp4 (eth0): option requested_root_path  => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option requested_routers    => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option requested_static_routes => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option requested_subnet_mask => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option requested_time_offset => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option requested_wpad       => '1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option rfc3442_classless_static_routes => '0 10 30 70 1 32 168 63 129 16 10 30 70 1 32 169 254 169 254 10 30 70 1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option routers              => '10.30.70.1'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option server_name          => 'TYO201090901031'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option subnet_mask          => '255.255.255.224'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): option unknown_245          => 'a8:3f:81:10'
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4063] dhcp4 (eth0): state changed unknown -> extended
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4072] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed')
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4142] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed')
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4143] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed')
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4147] manager: NetworkManager state is now CONNECTED_LOCAL
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4154] manager: NetworkManager state is now CONNECTED_SITE
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.4154] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS
Oct 26 09:06:03 vmfsppjb006 systemd[1]: Started The PHP FastCGI Process Manager.
Oct 26 09:06:03 vmfsppjb006 dhclient[1284]: Timeout too large reducing to: 2147483646 (TIME_MAX - 1)
Oct 26 09:06:03 vmfsppjb006 dhclient[1284]: bound to 10.30.70.10 -- renewal in 4294967295 seconds.
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.6701] device (eth0): Activation: successful, device activated.
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.6707] manager: NetworkManager state is now CONNECTED_GLOBAL
Oct 26 09:06:03 vmfsppjb006 NetworkManager[1048]: <info>  [1635206763.6710] manager: startup complete
Oct 26 09:06:03 vmfsppjb006 systemd[1]: Started Network Manager Wait Online.
Oct 26 09:06:03 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (metadata service crawler)...
Oct 26 09:06:05 vmfsppjb006 httpd[1060]: AH00558: httpd: Could not reliably determine the server's fully qualified domain name, using fe80::222:48ff:fe68:76f6. Set the 'ServerName' directive globally to suppress this message
Oct 26 09:06:05 vmfsppjb006 systemd[1]: Started The Apache HTTP Server.
Oct 26 09:06:05 vmfsppjb006 httpd[1060]: Server configured, listening on: port 80
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: Cloud-init v. 19.4 running 'init' at Tue, 26 Oct 2021 00:06:04 +0000. Up 26.32 seconds.
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info++++++++++++++++++++++++++++++++++++++++
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: | Device |  Up  |           Address           |       Mask      | Scope  |     Hw-Address    |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |  eth0  | True |         10.30.70.10         | 255.255.255.224 | global | 00:22:48:68:76:f6 |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |  eth0  | True | fe80::222:48ff:fe68:76f6/64 |        .        |  link  | 00:22:48:68:76:f6 |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   lo   | True |          127.0.0.1          |    255.0.0.0    |  host  |         .         |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   lo   | True |           ::1/128           |        .        |  host  |         .         |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +++++++++++++++++++++++++++++++Route IPv4 info++++++++++++++++++++++++++++++++
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: | Route |   Destination   |  Gateway   |     Genmask     | Interface | Flags |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   0   |     0.0.0.0     | 10.30.70.1 |     0.0.0.0     |    eth0   |   UG  |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   1   |    10.30.70.0   |  0.0.0.0   | 255.255.255.224 |    eth0   |   U   |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   2   |  168.63.129.16  | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   3   | 169.254.169.254 | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: | Route | Destination | Gateway | Interface | Flags |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   1   |  fe80::/64  |    ::   |    eth0   |   U   |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   3   |    local    |    ::   |    eth0   |   U   |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: |   4   |   ff00::/8  |    ::   |    eth0   |   U   |
Oct 26 09:06:05 vmfsppjb006 cloud-init[1304]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 26 09:06:05 vmfsppjb006 rngd[899]: Initializing entropy source jitter
Oct 26 09:06:07 vmfsppjb006 kernel: sda: sda1
Oct 26 09:06:07 vmfsppjb006 systemd[1]: Stopped File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 26 09:06:07 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 26 09:06:07 vmfsppjb006 systemd-fsck[1563]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 26 09:06:07 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 26 09:06:09 vmfsppjb006 kernel: EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Reloading.
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Started Initial cloud-init job (metadata service crawler).
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Reached target Cloud-config availability.
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Reached target Network is Online.
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Starting Apply the settings specified in cloud-config...
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Started Azure Linux Agent.
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Starting Crash recovery kernel arming...
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Starting OpenSSH server daemon...
Oct 26 09:06:09 vmfsppjb006 systemd[1]: Starting Permit User Sessions...
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Started Permit User Sessions.
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Started Getty on tty1.
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Started Command Scheduler.
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Started Job spooling tools.
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Started Serial Getty on ttyS0.
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Reached target Login Prompts.
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Started OpenSSH server daemon.
Oct 26 09:06:10 vmfsppjb006 chronyd[900]: Selected source 81.94.123.16
Oct 26 09:06:10 vmfsppjb006 chronyd[900]: System clock TAI offset set to 37 seconds
Oct 26 09:06:10 vmfsppjb006 rsyslogd[1627]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="1627" x-info="https://www.rsyslog.com"] start
Oct 26 09:06:10 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 26 09:06:10 vmfsppjb006 rsyslogd[1627]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 26 09:06:11 vmfsppjb006 cloud-init[1624]: Cloud-init v. 19.4 running 'modules:config' at Tue, 26 Oct 2021 00:06:10 +0000. Up 32.12 seconds.
Oct 26 09:06:11 vmfsppjb006 systemd[1]: Started Apply the settings specified in cloud-config.
Oct 26 09:06:11 vmfsppjb006 systemd[1]: Starting Execute cloud user/final scripts...
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.315926Z INFO Daemon Azure Linux Agent Version:2.2.46
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.466819Z INFO Daemon OS: redhat 8.2
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.469096Z INFO Daemon Python: 3.6.8
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.471841Z INFO Daemon CGroups Status: The cgroup filesystem is ready to use
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.477336Z INFO Daemon Run daemon
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.479772Z INFO Daemon No RDMA handler exists for distro='Red Hat Enterprise Linux' version='8.2'
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.529595Z INFO Daemon cloud-init is enabled: True
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.532858Z INFO Daemon Using cloud-init for provisioning
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.536020Z INFO Daemon Clean protocol and wireserver endpoint
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.540626Z INFO Daemon Provisioning already completed, skipping.
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.543653Z INFO Daemon RDMA capabilities are not enabled, skipping
Oct 26 09:06:11 vmfsppjb006 kdumpctl[1628]: Detected change(s) in the following file(s):
Oct 26 09:06:11 vmfsppjb006 kdumpctl[1628]:  
Oct 26 09:06:11 vmfsppjb006 kdumpctl[1628]:  /etc/fstab
Oct 26 09:06:11 vmfsppjb006 kdumpctl[1628]: Rebuilding /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img
Oct 26 09:06:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:11.590321Z INFO Daemon Determined Agent WALinuxAgent-2.5.0.2 to be the latest agent
Oct 26 09:06:11 vmfsppjb006 cloud-init[1691]: Cloud-init v. 19.4 running 'modules:final' at Tue, 26 Oct 2021 00:06:11 +0000. Up 33.01 seconds.
Oct 26 09:06:11 vmfsppjb006 cloud-init[1691]: Cloud-init v. 19.4 finished at Tue, 26 Oct 2021 00:06:11 +0000. Datasource DataSourceAzure [seed=/dev/sr0].  Up 33.26 seconds
Oct 26 09:06:12 vmfsppjb006 echo[1827]: trying to reload or restart NetworkManager.service
Oct 26 09:06:12 vmfsppjb006 systemd[1]: Reloading Network Manager.
Oct 26 09:06:12 vmfsppjb006 NetworkManager[1048]: <info>  [1635206772.1712] audit: op="reload" arg="0" pid=1835 uid=0 result="success"
Oct 26 09:06:12 vmfsppjb006 NetworkManager[1048]: <info>  [1635206772.1717] config: signal: SIGHUP (no changes from disk)
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.863985Z INFO ExtHandler ExtHandler The agent will now check for updates and then will process extensions. Output to /dev/console will be suspended during those operations.
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.960318Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.5.0.2 is running as the goal state agent
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.960508Z INFO ExtHandler ExtHandler Detect protocol endpoint
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.960573Z INFO ExtHandler ExtHandler Clean protocol and wireserver endpoint
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.960664Z INFO ExtHandler ExtHandler WireServer endpoint is not found. Rerun dhcp handler
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.960736Z INFO ExtHandler ExtHandler Test for route to 168.63.129.16
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.960927Z INFO ExtHandler ExtHandler Route to 168.63.129.16 exists
Oct 26 09:06:12 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:12.960990Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 26 09:06:13 vmfsppjb006 systemd[1]: Reloaded Network Manager.
Oct 26 09:06:13 vmfsppjb006 systemd[1]: Started Execute cloud user/final scripts.
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.092544Z INFO ExtHandler ExtHandler Fabric preferred wire protocol version:2015-04-05
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.092876Z INFO ExtHandler ExtHandler Wire protocol version:2012-11-30
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.092932Z INFO ExtHandler ExtHandler Server preferred version:2015-04-05
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.182237Z INFO ExtHandler ExtHandler Initializing goal state during protocol detection
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.189751Z INFO ExtHandler ExtHandler Fetching new goal state [incarnation 1 (force update)]
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.279668Z INFO ExtHandler ExtHandler Found private key matching thumbprint 475B1D33539B7CEF0746CC19FE9695256ECC45F7
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.285382Z INFO ExtHandler ExtHandler Fetch goal state completed
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.746009Z INFO ExtHandler ExtHandler Distro: redhat-8.2; OSUtil: RedhatOSUtil; AgentService: waagent; Python: 3.6.8; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.14.0;
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.750067Z INFO ExtHandler ExtHandler WALinuxAgent-2.5.0.2 running as process 1758
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.752858Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['redhat', '8.2', 'Ootpa', 'Red Hat Enterprise Linux']
Oct 26 09:06:13 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:13.849854Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct 26 09:06:14 vmfsppjb006 dracut[2057]: dracut-049-70.git20200228.el8
Oct 26 09:06:14 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:14.322503Z INFO ExtHandler ExtHandler Firewalld.service present on the VM, setting up permanent rules on the VM
Oct 26 09:06:15 vmfsppjb006 dracut[2059]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o "plymouth dash resume ifcfg earlykdump" --mount "/dev/mapper/rootvg-varlv /kdumproot//var xfs defaults,noauto" --no-hostonly-default-device -f /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img 4.18.0-193.47.1.el8_2.x86_64
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.088197Z INFO ExtHandler ExtHandler Firewall rules already set. No change needed.
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.088873Z INFO ExtHandler ExtHandler Persistent firewall rules setup successfully
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.089727Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True]
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.092333Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.092435Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.092770Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.092979Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: Iface#011Destination#011Gateway #011Flags#011RefCnt#011Use#011Metric#011Mask#011#011MTU#011Window#011IRTT
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: eth0#01100000000#01101461E0A#0110003#0110#0110#011100#01100000000#0110#0110#0110
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: eth0#01100461E0A#01100000000#0110001#0110#0110#011100#011E0FFFFFF#0110#0110#0110
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: eth0#01110813FA8#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: eth0#011FEA9FEA9#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.094122Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.102750Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.103090Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.103487Z INFO EnvHandler ExtHandler Configure routes
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.103572Z INFO EnvHandler ExtHandler Gateway:None
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.103631Z INFO EnvHandler ExtHandler Routes:None
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.104267Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.110206Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.110876Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.114594Z INFO MonitorHandler ExtHandler Network interfaces:
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: Executing ['ip', '-a', '-o', 'link']:
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:68:76:f6 brd ff:ff:ff:ff:ff:ff
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2: eth0    inet 10.30.70.10/27 brd 10.30.70.31 scope global noprefixroute eth0\       valid_lft forever preferred_lft forever
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2: eth0    inet6 fe80::222:48ff:fe68:76f6/64 scope link \       valid_lft forever preferred_lft forever
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.118407Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.118876Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.119824Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.124585Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.210927Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState started [Incarnation: 1; Activity Id: 043f0ab6-2db4-4ccb-a9fe-23d11c99f64b; Correlation Id: 63eb3173-374b-4157-89a6-78a1fd8910ef; GS Creation Time: 2021-10-26T00:05:16.280258Z]
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.211626Z INFO ExtHandler ExtHandler No extension/run-time settings settings found for Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.251693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Target handler state: enabled [incarnation 1]
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.253236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] [Enable] current handler state is: enabled
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.253353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Update settings file: 0.settings
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.253615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Requested extension state: enabled
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.254143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Enable extension: [./install.sh enable]
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.254468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.1974.1", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 26 09:06:15 vmfsppjb006 dracut[2059]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 26 09:06:15 vmfsppjb006 dracut[2059]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.837539Z INFO EnvHandler ExtHandler Set block dev timeout: sdb with timeout: 300
Oct 26 09:06:15 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:15.837835Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300
Oct 26 09:06:15 vmfsppjb006 dracut[2059]: dracut module 'ifcfg' will not be installed, because it's in the list to be omitted!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'plymouth' will not be installed, because it's in the list to be omitted!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 26 09:06:16 vmfsppjb006 dracut[2059]: dracut module 'resume' will not be installed, because it's in the list to be omitted!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'earlykdump' will not be installed, because it's in the list to be omitted!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: *** Including module: bash ***
Oct 26 09:06:17 vmfsppjb006 dracut[2059]: *** Including module: systemd ***
Oct 26 09:06:18 vmfsppjb006 dracut[2059]: *** Including module: systemd-initrd ***
Oct 26 09:06:18 vmfsppjb006 dracut[2059]: *** Including module: nss-softokn ***
Oct 26 09:06:18 vmfsppjb006 dracut[2059]: *** Including module: rngd ***
Oct 26 09:06:18 vmfsppjb006 dracut[2059]: *** Including module: i18n ***
Oct 26 09:06:18 vmfsppjb006 dracut[2059]: *** Including module: drm ***
Oct 26 09:06:18 vmfsppjb006 dracut[2059]: *** Including module: prefixdevname ***
Oct 26 09:06:18 vmfsppjb006 dracut[2059]: *** Including module: dm ***
Oct 26 09:06:19 vmfsppjb006 dracut[2059]: Skipping udev rule: 64-device-mapper.rules
Oct 26 09:06:19 vmfsppjb006 dracut[2059]: Skipping udev rule: 60-persistent-storage-dm.rules
Oct 26 09:06:19 vmfsppjb006 dracut[2059]: Skipping udev rule: 55-dm.rules
Oct 26 09:06:19 vmfsppjb006 dracut[2059]: *** Including module: kernel-modules ***
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: *** Including module: kernel-modules-extra ***
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: *** Including module: lvm ***
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: Skipping udev rule: 64-device-mapper.rules
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: Skipping udev rule: 56-lvm.rules
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: Skipping udev rule: 60-persistent-storage-lvm.rules
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: *** Including module: fstab-sys ***
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: *** Including module: rootfs-block ***
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: *** Including module: terminfo ***
Oct 26 09:06:20 vmfsppjb006 dracut[2059]: *** Including module: udev-rules ***
Oct 26 09:06:21 vmfsppjb006 dracut[2059]: Skipping udev rule: 91-permissions.rules
Oct 26 09:06:21 vmfsppjb006 dracut[2059]: Skipping udev rule: 80-drivers-modprobe.rules
Oct 26 09:06:21 vmfsppjb006 dracut[2059]: *** Including module: dracut-systemd ***
Oct 26 09:06:21 vmfsppjb006 dracut[2059]: *** Including module: usrmount ***
Oct 26 09:06:21 vmfsppjb006 dracut[2059]: *** Including module: base ***
Oct 26 09:06:21 vmfsppjb006 dracut[2059]: *** Including module: fs-lib ***
Oct 26 09:06:21 vmfsppjb006 dracut[2059]: *** Including module: kdumpbase ***
Oct 26 09:06:23 vmfsppjb006 dracut[2059]: *** Including module: microcode_ctl-fw_dir_override ***
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:  microcode_ctl module: mangling fw_dir
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware"
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel"...
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:      microcode_ctl: intel: caveats check for kernel version "4.18.0-193.47.1.el8_2.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel" to fw_dir variable
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"...
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: configuration "intel-06-2d-07" is ignored
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"...
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: configuration "intel-06-4e-03" is ignored
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"...
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: configuration "intel-06-4f-01" is ignored
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"...
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: configuration "intel-06-55-04" is ignored
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"...
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: configuration "intel-06-5e-03" is ignored
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"...
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: configuration "intel-06-8c-01" is ignored
Oct 26 09:06:23 vmfsppjb006 dracut[2059]:    microcode_ctl: final fw_dir: "/usr/share/microcode_ctl/ucode_with_caveats/intel /lib/firmware/updates /lib/firmware"
Oct 26 09:06:23 vmfsppjb006 dracut[2059]: *** Including module: shutdown ***
Oct 26 09:06:23 vmfsppjb006 dracut[2059]: *** Including module: squash ***
Oct 26 09:06:24 vmfsppjb006 dracut[2059]: *** Including modules done ***
Oct 26 09:06:24 vmfsppjb006 dracut[2059]: *** Installing kernel module dependencies ***
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:24.283225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Command: ./install.sh enable
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: [stdout]
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: Checking if system is supported
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: This system is supported
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: Enabling Azure Network Watcher Agent
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: Force kill all NetworkWatcher Agent related processes
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: Linux version 4.18.0-193.47.1.el8_2.x86_64 (mockbuild@x86-vm-07.build.eng.bos.redhat.com) (gcc version 8.3.1 20191121 (Red Hat 8.3.1-5) (GCC)) #1 SMP Thu Mar 4 03:03:32 EST 2021
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: Setting up Red Hat environment for SSL handshakes
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: Starting AzureNetworkWatcherAgent...Started[0]
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: Core limit: 0
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: [stderr]
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    echo "Disabling Azure Network Watcher Agent"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    forceKillOldAgent
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: }
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: uninstall()
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: {
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    echo "Uninstalling Azure Network Watcher Agent"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    forceKillOldAgent
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: }
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: install()
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: {
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    echo "Installing Azure Network Watcher Agent"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    forceKillOldAgent
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    continueOnUpdateFailureConfigured
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    if [ $? -eq 1 ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        if [ $? -eq 1 ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:            echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:            uninstall
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        fi
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    fi
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: }
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: update()
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: {
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    echo "Updating Azure Network Watcher Agent"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    continueOnUpdateFailureConfigured
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    if [ $? -eq 1 ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        if [ $? -eq 1 ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:            echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:            disable
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        fi
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    fi
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    install
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: }
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: enable()
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: {
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    echo "Enabling Azure Network Watcher Agent"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    forceKillOldAgent
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    /etc/init.d/AzureNetworkWatcherAgent start
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # after agent start the process controller forks child process that
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # initializing the environmet writing X.status file in
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # /var/lib/waagent/NWA folder. Unfortunately until environment is received
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # the status file could not be created since environment contains all the
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # informaton about destination folder, seq id etc. If X.status file is not
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # there waagent caused a failure that is shown in UI as deployment problem
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # even though agent is running successfully. In order to avoid the UI
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # failure the simple thing for now is to wait for a bit until fork is done,
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # later when waagent has better logic to handle a status it should be
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    # removed.
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    sleep 7s
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: }
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: GLIBC_MINVERSION="2.11"
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: + GLIBC_MINVERSION=2.11
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: GLIBC_MINVERSION_MAJOR=2
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: + GLIBC_MINVERSION_MAJOR=2
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: GLIBC_MINVERSION_MINOR=11
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: + GLIBC_MINVERSION_MINOR=11
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: is_version_supported()
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: {
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    curversion=$1
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    if [ "$curversion" = "$GLIBC_MINVERSION" ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        return 1
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    fi
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    local hasdot=0
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    local delim=.
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    case $curversion in
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        *$delim*) hasdot=1;;
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        *) hasdot=0;;
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    esac
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:    if [ $hasdot -eq 1 ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        firstval=`echo $curversion | cut -d "." -f 1`
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:            return 1
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:            return 0
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]:        e
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:24.532240Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Target handler state: enabled [incarnation 1]
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:24.640420Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] [Enable] current handler state is: enabled
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:24.640592Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Extension has no settings, write empty 0.settings
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:24.809948Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Enable extension: [scripts/run_python.sh scripts/enableHandler.py 1>&2]
Oct 26 09:06:24 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:24.810620Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Executing command: /var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500/scripts/run_python.sh scripts/enableHandler.py 1>&2 with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "9.10.11.17500", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 26 09:06:26 vmfsppjb006 dracut[2059]: *** Installing kernel module dependencies done ***
Oct 26 09:06:26 vmfsppjb006 dracut[2059]: *** Resolving executable dependencies ***
Oct 26 09:06:27 vmfsppjb006 kernel: bluechannel: loading out-of-tree module taints kernel.
Oct 26 09:06:27 vmfsppjb006 kernel: bluechannel: module license 'Proprietary' taints kernel.
Oct 26 09:06:27 vmfsppjb006 kernel: Disabling lock debugging due to kernel taint
Oct 26 09:06:27 vmfsppjb006 kernel: bluechannel: module verification failed: signature and/or required key missing - tainting kernel
Oct 26 09:06:27 vmfsppjb006 kernel: bluechannel: driver loading ver=9.10.11 rev=17500
Oct 26 09:06:27 vmfsppjb006 kernel: msda: driver loading ver=9.10.11 rev=17500
Oct 26 09:06:27 vmfsppjb006 kernel: msda: ipv6 support is active
Oct 26 09:06:27 vmfsppjb006 kernel: msda: bluechannel_link @00000000b0888aac
Oct 26 09:06:27 vmfsppjb006 kernel: msda: bluechannel_broadcast_heartbeat @00000000d37051a1
Oct 26 09:06:27 vmfsppjb006 kernel: sock_create v4 socket
Oct 26 09:06:27 vmfsppjb006 kernel: Supertramp allocated at 0000000046077810
Oct 26 09:06:27 vmfsppjb006 kernel: msda: device registered at 10.56
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:27.857912Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Command: scripts/run_python.sh scripts/enableHandler.py 1>&2
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: [stdout]
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: [stderr]
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: Microsoft Dependency Agent service started.
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:27.905032Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Target handler state: enabled [incarnation 1]
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:27.998345Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] [Enable] current handler state is: enabled
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:27.998501Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Update settings file: 0.settings
Oct 26 09:06:27 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:27.998817Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Requested extension state: enabled
Oct 26 09:06:28 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:27.999374Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable extension: [omsagent_shim.sh -enable]
Oct 26 09:06:28 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:27.999748Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Executing command: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/omsagent_shim.sh -enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.13.40", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 26 09:06:28 vmfsppjb006 kernel: msda: set_shm_size=0x800000
Oct 26 09:06:28 vmfsppjb006 kernel: msda: attaching hooks
Oct 26 09:06:28 vmfsppjb006 kernel: shm_area: initialized
Oct 26 09:06:28 vmfsppjb006 kernel: msda: invoking bluechannel_link: LINK {handle_bluechannel_event=000000008ab7aa41}
Oct 26 09:06:28 vmfsppjb006 kernel: bluechannel: transition to LINKED
Oct 26 09:06:28 vmfsppjb006 kernel: msda: starting extants
Oct 26 09:06:28 vmfsppjb006 kernel: msda: extants complete
Oct 26 09:06:28 vmfsppjb006 kernel: msda: mmap requested size=8388608 area_size=8388608
Oct 26 09:06:28 vmfsppjb006 dracut[2059]: *** Resolving executable dependencies done***
Oct 26 09:06:29 vmfsppjb006 dracut[2059]: *** Hardlinking files ***
Oct 26 09:06:29 vmfsppjb006 dracut[2059]: *** Hardlinking files done ***
Oct 26 09:06:29 vmfsppjb006 dracut[2059]: *** Stripping files ***
Oct 26 09:06:30 vmfsppjb006 dracut[2059]: *** Stripping files done ***
Oct 26 09:06:30 vmfsppjb006 dracut[2059]: *** Generating early-microcode cpio image ***
Oct 26 09:06:30 vmfsppjb006 dracut[2059]: *** Constructing GenuineIntel.bin ****
Oct 26 09:06:30 vmfsppjb006 dracut[2059]: *** Store current command line parameters ***
Oct 26 09:06:30 vmfsppjb006 dracut[2059]: Stored kernel commandline:
Oct 26 09:06:30 vmfsppjb006 dracut[2059]: rd.lvm.lv=rootvg/varlv
Oct 26 09:06:30 vmfsppjb006 dracut[2059]: *** Creating image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' ***
Oct 26 09:06:41 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 26 09:06:41 vmfsppjb006 kernel: hv_balloon: Max. dynamic memory size: 2048 MB
Oct 26 09:06:42 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 26 09:06:42 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 26 09:06:46 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:46.085162Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Command: omsagent_shim.sh -enable
Oct 26 09:06:46 vmfsppjb006 python3.6[1625]: [stdout]
Oct 26 09:06:46 vmfsppjb006 python3.6[1625]: 2021/10/26 09:06:44 [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable,success,0,Enable succeeded
Oct 26 09:06:46 vmfsppjb006 python3.6[1625]: [stderr]
Oct 26 09:06:47 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:47.636615Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState completed [Incarnation: 1; 32425 ms; Activity Id: 043f0ab6-2db4-4ccb-a9fe-23d11c99f64b; Correlation Id: 63eb3173-374b-4157-89a6-78a1fd8910ef; GS Creation Time: 2021-10-26T00:05:16.280258Z]
Oct 26 09:06:47 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:47.740575Z INFO ExtHandler ExtHandler Extension status: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 26 09:06:47 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:47.741128Z INFO ExtHandler ExtHandler All extensions in the goal state have reached a terminal state: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 26 09:06:47 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:47.741501Z INFO ExtHandler ExtHandler Looking for existing remote access users.
Oct 26 09:06:47 vmfsppjb006 sssd[nss][924]: Enumeration requested but not enabled
Oct 26 09:06:47 vmfsppjb006 python3.6[1625]: 2021-10-26T00:06:47.794141Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 09:06:51 vmfsppjb006 dracut[2059]: *** Creating initramfs image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' done ***
Oct 26 09:06:54 vmfsppjb006 kdumpctl[1628]: kexec: loaded kdump kernel
Oct 26 09:06:54 vmfsppjb006 kdumpctl[1628]: Starting kdump: [OK]
Oct 26 09:06:54 vmfsppjb006 systemd[1]: Started Crash recovery kernel arming.
Oct 26 09:06:54 vmfsppjb006 systemd[1]: Started MySQL Server.
Oct 26 09:06:54 vmfsppjb006 systemd[1]: Starting Zabbix Server...
Oct 26 09:06:54 vmfsppjb006 systemd[1]: Starting Jobarranger Monitor...
Oct 26 09:06:54 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 09:06:55 vmfsppjb006 systemd[1]: zabbix-server.service: Can't open PID file /run/zabbix/zabbix_server.pid (yet?) after start: No such file or directory
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Started Zabbix Server.
Oct 26 09:06:55 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 09:06:55 vmfsppjb006 systemd[1]: jobarg-monitor.service: Can't open PID file /run/jobarranger/jobarg_monitor.pid (yet?) after start: No such file or directory
Oct 26 09:06:55 vmfsppjb006 journal[6550]: Job Arranger Monitor[6550]: Starting Job Arranger monitor. Job Arranger 5.0.1 (revision 7557).
Oct 26 09:06:55 vmfsppjb006 journal[6551]: Job Arranger Monitor[6551]: jobarg_monitor #0 started [monitor]
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Started Jobarranger Monitor.
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Reached target Multi-User System.
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Starting Update UTMP about System Runlevel Changes...
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Reached target Cloud-init target.
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Starting Azure temporary resource disk dataloss warning file creation...
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Started Update UTMP about System Runlevel Changes.
Oct 26 09:06:55 vmfsppjb006 journal[6548]: Job Arranger Server[6548]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 26 09:06:55 vmfsppjb006 journal[6548]: Job Arranger Server[6548]: [JASERVER000003] server #0 started [main process]
Oct 26 09:06:55 vmfsppjb006 journal[6557]: Job Arranger Server[6557]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 26 09:06:55 vmfsppjb006 journal[6558]: Job Arranger Server[6558]: [JASERVER000004] server #2 started [start the job #1]
Oct 26 09:06:55 vmfsppjb006 journal[6559]: Job Arranger Server[6559]: [JASERVER000004] server #3 started [check the running job #1]
Oct 26 09:06:55 vmfsppjb006 journal[6560]: Job Arranger Server[6560]: [JASERVER000004] server #4 started [job trapper #1]
Oct 26 09:06:55 vmfsppjb006 journal[6561]: Job Arranger Server[6561]: [JASERVER000004] server #5 started [job trapper #2]
Oct 26 09:06:55 vmfsppjb006 journal[6562]: Job Arranger Server[6562]: [JASERVER000004] server #6 started [job trapper #3]
Oct 26 09:06:55 vmfsppjb006 journal[6563]: Job Arranger Server[6563]: [JASERVER000004] server #7 started [job trapper #4]
Oct 26 09:06:55 vmfsppjb006 journal[6564]: Job Arranger Server[6564]: [JASERVER000004] server #8 started [job trapper #5]
Oct 26 09:06:55 vmfsppjb006 journal[6565]: Job Arranger Server[6565]: [JASERVER000004] server #9 started [job loader #1]
Oct 26 09:06:55 vmfsppjb006 journal[6566]: Job Arranger Server[6566]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 26 09:06:55 vmfsppjb006 journal[6567]: Job Arranger Server[6567]: [JASERVER000004] server #11 started [message send #1]
Oct 26 09:06:55 vmfsppjb006 journal[6568]: Job Arranger Server[6568]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 26 09:06:55 vmfsppjb006 temp-disk-dataloss-warning[6554]: Creating a dataloss warning file at /mnt/DATALOSS_WARNING_README.txt
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Started Azure temporary resource disk dataloss warning file creation.
Oct 26 09:06:55 vmfsppjb006 systemd[1]: Startup finished in 1.282s (kernel) + 8.879s (initrd) + 1min 6.728s (userspace) = 1min 16.890s.
Oct 26 09:06:58 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:06:58 vmfsppjb006 dbus-daemon[6590]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:07:00 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:07:01 vmfsppjb006 setroubleshoot[6590]: SELinux is preventing zabbix_server from using the dac_override capability. For complete SELinux messages run: sealert -l a6656240-7d68-4406-88d9-8f8364246780
Oct 26 09:07:01 vmfsppjb006 platform-python[6590]: SELinux is preventing zabbix_server from using the dac_override capability.#012#012*****  Plugin dac_override (91.4 confidence) suggests   **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012*****  Plugin catchall (9.59 confidence) suggests   **************************#012#012If you believe that zabbix_server should have the dac_override capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:07:04 vmfsppjb006 setroubleshoot[6590]: failed to retrieve rpm info for /run/zabbix/zabbix_server_alerter.sock
Oct 26 09:07:04 vmfsppjb006 setroubleshoot[6590]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_alerter.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:07:04 vmfsppjb006 platform-python[6590]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_alerter.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_alerter.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:09:01 vmfsppjb006 systemd[1]: Created slice system-user\x2druntime\x2ddir.slice.
Oct 26 09:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 09:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 09:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 09:09:01 vmfsppjb006 systemd[1]: Started Session 1 of user omsagent.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Reached target Timers.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Reached target Paths.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Starting D-Bus User Message Bus Socket.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Listening on D-Bus User Message Bus Socket.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Reached target Sockets.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Reached target Basic System.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Reached target Default.
Oct 26 09:09:01 vmfsppjb006 systemd[6790]: Startup finished in 271ms.
Oct 26 09:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 09:09:10 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:09:10 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Stopped target Default.
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Stopped target Basic System.
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Stopped target Timers.
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Stopped target Paths.
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Stopped target Sockets.
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Closed D-Bus User Message Bus Socket.
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Reached target Shutdown.
Oct 26 09:09:10 vmfsppjb006 systemd[6790]: Starting Exit the Session...
Oct 26 09:09:11 vmfsppjb006 systemd[1]: user@986.service: Killing process 6924 (systemctl) with signal SIGKILL.
Oct 26 09:09:11 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:09:11 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 09:09:11 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:09:11 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 09:09:11 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 09:09:11 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 09:09:25 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:09:25 vmfsppjb006 dbus-daemon[6947]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:09:26 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:09:26 vmfsppjb006 setroubleshoot[6947]: failed to retrieve rpm info for /run/zabbix/zabbix_server_preprocessing.sock
Oct 26 09:09:27 vmfsppjb006 setroubleshoot[6947]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:09:27 vmfsppjb006 platform-python[6947]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_preprocessing.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:09:36 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:09:36 vmfsppjb006 dbus-daemon[6957]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:09:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:09:37 vmfsppjb006 setroubleshoot[6957]: failed to retrieve rpm info for /run/zabbix/zabbix_server_preprocessing.sock
Oct 26 09:09:38 vmfsppjb006 setroubleshoot[6957]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:09:38 vmfsppjb006 platform-python[6957]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_preprocessing.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:11:15 vmfsppjb006 systemd[1]: Started /run/user/1000 mount wrapper.
Oct 26 09:11:15 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1000.
Oct 26 09:11:15 vmfsppjb006 systemd[1]: Starting User Manager for UID 1000...
Oct 26 09:11:15 vmfsppjb006 systemd[1]: Started Session 3 of user finsrvpf.
Oct 26 09:11:15 vmfsppjb006 systemd-logind[931]: New session 3 of user finsrvpf.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Reached target Paths.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Reached target Timers.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Starting D-Bus User Message Bus Socket.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Listening on D-Bus User Message Bus Socket.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Reached target Sockets.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Reached target Basic System.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Reached target Default.
Oct 26 09:11:15 vmfsppjb006 systemd[7065]: Startup finished in 51ms.
Oct 26 09:11:15 vmfsppjb006 systemd[1]: Started User Manager for UID 1000.
Oct 26 09:11:22 vmfsppjb006 su[7108]: (to root) finsrvpf on pts/0
Oct 26 09:11:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:11:37 vmfsppjb006 dbus-daemon[7152]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:11:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:11:38 vmfsppjb006 setroubleshoot[7152]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:11:39 vmfsppjb006 setroubleshoot[7152]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:11:39 vmfsppjb006 platform-python[7152]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:13:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:13:37 vmfsppjb006 dbus-daemon[7269]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:13:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:13:38 vmfsppjb006 setroubleshoot[7269]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:13:39 vmfsppjb006 setroubleshoot[7269]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:13:39 vmfsppjb006 platform-python[7269]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:14:01 vmfsppjb006 systemd[7065]: Starting Mark boot as successful...
Oct 26 09:14:01 vmfsppjb006 systemd[7065]: Started Mark boot as successful.
Oct 26 09:15:43 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 09:15:51 vmfsppjb006 dnf[7400]: packages-microsoft-com-prod                      14 kB/s | 3.0 kB     00:00
Oct 26 09:15:52 vmfsppjb006 dnf[7400]: packages-microsoft-com-prod                     7.3 MB/s | 6.2 MB     00:00
Oct 26 09:15:53 vmfsppjb006 dnf[7400]: MySQL 8.0 Community Server                      122 kB/s | 2.6 kB     00:00
Oct 26 09:15:54 vmfsppjb006 dnf[7400]: MySQL Connectors Community                       68 kB/s | 2.6 kB     00:00
Oct 26 09:15:54 vmfsppjb006 dnf[7400]: MySQL Tools Community                            69 kB/s | 2.6 kB     00:00
Oct 26 09:15:55 vmfsppjb006 dnf[7400]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  3.8 kB/s | 2.4 kB     00:00
Oct 26 09:15:57 vmfsppjb006 dnf[7400]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 5.0 kB/s | 2.8 kB     00:00
Oct 26 09:16:00 vmfsppjb006 dnf[7400]: Microsoft Azure RPMs for RHEL8 Extended Update  6.4 kB/s | 2.1 kB     00:00
Oct 26 09:16:00 vmfsppjb006 dnf[7400]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 26 09:16:01 vmfsppjb006 dnf[7400]: Zabbix Official Repository non-supported - x86_ 8.2 kB/s | 3.0 kB     00:00
Oct 26 09:16:03 vmfsppjb006 dnf[7400]: Metadata cache created.
Oct 26 09:16:03 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 09:16:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:16:37 vmfsppjb006 dbus-daemon[7481]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:16:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:16:38 vmfsppjb006 setroubleshoot[7481]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:16:39 vmfsppjb006 setroubleshoot[7481]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:16:39 vmfsppjb006 platform-python[7481]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:20:14 vmfsppjb006 systemd[1]: Started Session 5 of user finsrvpf.
Oct 26 09:20:14 vmfsppjb006 systemd-logind[931]: New session 5 of user finsrvpf.
Oct 26 09:20:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:20:37 vmfsppjb006 dbus-daemon[7749]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:20:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:20:38 vmfsppjb006 setroubleshoot[7749]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:20:39 vmfsppjb006 setroubleshoot[7749]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:20:39 vmfsppjb006 platform-python[7749]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:20:43 vmfsppjb006 systemd[1]: Starting Cleanup of Temporary Directories...
Oct 26 09:20:43 vmfsppjb006 systemd-tmpfiles[7757]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 26 09:20:43 vmfsppjb006 systemd-tmpfiles[7757]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 26 09:20:43 vmfsppjb006 systemd[1]: Started Cleanup of Temporary Directories.
Oct 26 09:20:50 vmfsppjb006 su[7765]: (to root) finsrvpf on pts/1
Oct 26 09:21:11 vmfsppjb006 python3.6[1625]: 2021-10-26T00:21:11.656621Z INFO Daemon Agent WALinuxAgent-2.5.0.2 launched with command '/usr/bin/python3.6 -u bin/WALinuxAgent-2.5.0.2-py2.7.egg -run-exthandlers' is successfully running
Oct 26 09:21:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:21:37 vmfsppjb006 dbus-daemon[7839]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:21:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:21:38 vmfsppjb006 setroubleshoot[7839]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:21:39 vmfsppjb006 setroubleshoot[7839]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:21:39 vmfsppjb006 platform-python[7839]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:22:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:22:37 vmfsppjb006 dbus-daemon[7906]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:22:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:22:38 vmfsppjb006 setroubleshoot[7906]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:22:39 vmfsppjb006 setroubleshoot[7906]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:22:39 vmfsppjb006 platform-python[7906]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 09:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 09:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 09:24:01 vmfsppjb006 systemd[1]: Started Session 6 of user omsagent.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Reached target Timers.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Reached target Paths.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Starting D-Bus User Message Bus Socket.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Listening on D-Bus User Message Bus Socket.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Reached target Sockets.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Reached target Basic System.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Reached target Default.
Oct 26 09:24:01 vmfsppjb006 systemd[7994]: Startup finished in 48ms.
Oct 26 09:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Stopped target Default.
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Stopped target Basic System.
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Stopped target Paths.
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Stopped target Sockets.
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Closed D-Bus User Message Bus Socket.
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Reached target Shutdown.
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Starting Exit the Session...
Oct 26 09:24:04 vmfsppjb006 systemd[7994]: Stopped target Timers.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 8113 (systemctl) with signal SIGKILL.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 09:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 09:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 09:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:24:37 vmfsppjb006 dbus-daemon[8159]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:24:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:24:38 vmfsppjb006 setroubleshoot[8159]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:24:39 vmfsppjb006 setroubleshoot[8159]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:24:39 vmfsppjb006 platform-python[8159]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:26:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:26:37 vmfsppjb006 dbus-daemon[8351]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:26:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:26:37 vmfsppjb006 setroubleshoot[8351]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:26:38 vmfsppjb006 setroubleshoot[8351]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:26:38 vmfsppjb006 platform-python[8351]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:35:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:35:37 vmfsppjb006 dbus-daemon[8873]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:35:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:35:37 vmfsppjb006 setroubleshoot[8873]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:35:38 vmfsppjb006 setroubleshoot[8873]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:35:38 vmfsppjb006 platform-python[8873]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:36:44 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 09:36:44 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 09:36:44 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 09:36:44 vmfsppjb006 systemd[1]: Started Session c1 of user root.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Reached target Timers.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Reached target Paths.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Starting D-Bus User Message Bus Socket.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Listening on D-Bus User Message Bus Socket.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Reached target Sockets.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Reached target Basic System.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Reached target Default.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Startup finished in 51ms.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Stopped target Default.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Stopped target Basic System.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Stopped target Timers.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Stopped target Paths.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Stopped target Sockets.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Closed D-Bus User Message Bus Socket.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Reached target Shutdown.
Oct 26 09:36:45 vmfsppjb006 systemd[9021]: Starting Exit the Session...
Oct 26 09:36:45 vmfsppjb006 systemd[1]: user@0.service: Killing process 9056 (systemctl) with signal SIGKILL.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 09:36:45 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 09:36:45 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 09:36:48 vmfsppjb006 python3.6[1625]: 2021-10-26T00:36:48.870050Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 1;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 09:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:37:37 vmfsppjb006 dbus-daemon[9120]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:37:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:37:37 vmfsppjb006 setroubleshoot[9120]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:37:38 vmfsppjb006 setroubleshoot[9120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:37:38 vmfsppjb006 platform-python[9120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:38:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:38:37 vmfsppjb006 dbus-daemon[9183]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:38:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:38:37 vmfsppjb006 setroubleshoot[9183]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:38:38 vmfsppjb006 setroubleshoot[9183]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:38:38 vmfsppjb006 platform-python[9183]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 09:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 09:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 09:39:01 vmfsppjb006 systemd[1]: Started Session 9 of user omsagent.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Starting D-Bus User Message Bus Socket.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Reached target Timers.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Reached target Paths.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Listening on D-Bus User Message Bus Socket.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Reached target Sockets.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Reached target Basic System.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Reached target Default.
Oct 26 09:39:01 vmfsppjb006 systemd[9222]: Startup finished in 47ms.
Oct 26 09:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Stopped target Default.
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Stopped target Basic System.
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Stopped target Paths.
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Stopped target Sockets.
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Closed D-Bus User Message Bus Socket.
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Reached target Shutdown.
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Starting Exit the Session...
Oct 26 09:39:03 vmfsppjb006 systemd[9222]: Stopped target Timers.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 9344 (systemctl) with signal SIGKILL.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 09:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 09:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 09:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:39:37 vmfsppjb006 dbus-daemon[9380]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:39:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:39:37 vmfsppjb006 setroubleshoot[9380]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:39:38 vmfsppjb006 setroubleshoot[9380]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:39:38 vmfsppjb006 platform-python[9380]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:40:37 vmfsppjb006 dbus-daemon[9437]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:40:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:40:38 vmfsppjb006 setroubleshoot[9437]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:40:38 vmfsppjb006 setroubleshoot[9437]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:40:38 vmfsppjb006 platform-python[9437]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 09:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 09:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 09:54:01 vmfsppjb006 systemd[1]: Started Session 11 of user omsagent.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Reached target Paths.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Reached target Timers.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Starting D-Bus User Message Bus Socket.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Listening on D-Bus User Message Bus Socket.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Reached target Sockets.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Reached target Basic System.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Reached target Default.
Oct 26 09:54:01 vmfsppjb006 systemd[10205]: Startup finished in 46ms.
Oct 26 09:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 09:54:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:54:05 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Stopped target Default.
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Stopped target Basic System.
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Stopped target Sockets.
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Closed D-Bus User Message Bus Socket.
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Stopped target Timers.
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Stopped target Paths.
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Reached target Shutdown.
Oct 26 09:54:05 vmfsppjb006 systemd[10205]: Starting Exit the Session...
Oct 26 09:54:05 vmfsppjb006 systemd[1]: user@986.service: Killing process 10324 (systemctl) with signal SIGKILL.
Oct 26 09:54:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:54:05 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 09:54:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 09:54:05 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 09:54:05 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 09:54:05 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 09:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:54:37 vmfsppjb006 dbus-daemon[10361]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:54:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:54:38 vmfsppjb006 setroubleshoot[10361]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:54:38 vmfsppjb006 setroubleshoot[10361]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:54:38 vmfsppjb006 platform-python[10361]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 09:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 09:55:37 vmfsppjb006 dbus-daemon[10430]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 09:55:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 09:55:38 vmfsppjb006 setroubleshoot[10430]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 09:55:38 vmfsppjb006 setroubleshoot[10430]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 09:55:38 vmfsppjb006 platform-python[10430]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:01:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:01:37 vmfsppjb006 dbus-daemon[10787]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:01:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:01:38 vmfsppjb006 setroubleshoot[10787]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:01:38 vmfsppjb006 setroubleshoot[10787]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:01:38 vmfsppjb006 platform-python[10787]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:06:18 vmfsppjb006 python3.6[1625]: 2021-10-26T01:06:18.536962Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Started Session c2 of user root.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Reached target Paths.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Reached target Timers.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Starting D-Bus User Message Bus Socket.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Listening on D-Bus User Message Bus Socket.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Reached target Sockets.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Reached target Basic System.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Reached target Default.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Startup finished in 49ms.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Stopped target Default.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Stopped target Basic System.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Stopped target Timers.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Stopped target Sockets.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Closed D-Bus User Message Bus Socket.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Stopped target Paths.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Reached target Shutdown.
Oct 26 10:06:47 vmfsppjb006 systemd[11155]: Starting Exit the Session...
Oct 26 10:06:47 vmfsppjb006 systemd[1]: user@0.service: Killing process 11191 (systemctl) with signal SIGKILL.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 10:06:47 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 10:06:54 vmfsppjb006 python3.6[1625]: 2021-10-26T01:06:54.682953Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 2;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 10:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:07:37 vmfsppjb006 dbus-daemon[11257]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:07:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:07:38 vmfsppjb006 setroubleshoot[11257]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:07:38 vmfsppjb006 setroubleshoot[11257]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:07:38 vmfsppjb006 platform-python[11257]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 10:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 10:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 10:09:01 vmfsppjb006 systemd[1]: Started Session 14 of user omsagent.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Reached target Paths.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Starting D-Bus User Message Bus Socket.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Reached target Timers.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Listening on D-Bus User Message Bus Socket.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Reached target Sockets.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Reached target Basic System.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Reached target Default.
Oct 26 10:09:01 vmfsppjb006 systemd[11346]: Startup finished in 50ms.
Oct 26 10:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 10:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Stopped target Default.
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Stopped target Basic System.
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Stopped target Timers.
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Stopped target Paths.
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Stopped target Sockets.
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Closed D-Bus User Message Bus Socket.
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Reached target Shutdown.
Oct 26 10:09:03 vmfsppjb006 systemd[11346]: Starting Exit the Session...
Oct 26 10:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 11464 (systemctl) with signal SIGKILL.
Oct 26 10:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 10:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 10:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 10:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 10:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:09:37 vmfsppjb006 dbus-daemon[11499]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:09:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:09:38 vmfsppjb006 setroubleshoot[11499]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:09:39 vmfsppjb006 setroubleshoot[11499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:09:39 vmfsppjb006 platform-python[11499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:10:37 vmfsppjb006 dbus-daemon[11566]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:10:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:10:38 vmfsppjb006 setroubleshoot[11566]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:10:39 vmfsppjb006 setroubleshoot[11566]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:10:39 vmfsppjb006 platform-python[11566]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:16:03 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 10:16:04 vmfsppjb006 dnf[11878]: Metadata cache refreshed recently.
Oct 26 10:16:04 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 10:16:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:16:37 vmfsppjb006 dbus-daemon[11917]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:16:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:16:38 vmfsppjb006 setroubleshoot[11917]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:16:39 vmfsppjb006 setroubleshoot[11917]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:16:39 vmfsppjb006 platform-python[11917]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 10:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 10:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 10:24:01 vmfsppjb006 systemd[1]: Started Session 16 of user omsagent.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Reached target Timers.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Starting D-Bus User Message Bus Socket.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Reached target Paths.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Listening on D-Bus User Message Bus Socket.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Reached target Sockets.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Reached target Basic System.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Reached target Default.
Oct 26 10:24:01 vmfsppjb006 systemd[12343]: Startup finished in 47ms.
Oct 26 10:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 10:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Stopped target Default.
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Stopped target Basic System.
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Stopped target Timers.
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Stopped target Sockets.
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Closed D-Bus User Message Bus Socket.
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Stopped target Paths.
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Reached target Shutdown.
Oct 26 10:24:02 vmfsppjb006 systemd[12343]: Starting Exit the Session...
Oct 26 10:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 12389 (systemctl) with signal SIGKILL.
Oct 26 10:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 10:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 10:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 10:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 10:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:24:37 vmfsppjb006 dbus-daemon[12431]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:24:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:24:38 vmfsppjb006 setroubleshoot[12431]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:24:39 vmfsppjb006 setroubleshoot[12431]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:24:39 vmfsppjb006 platform-python[12431]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:25:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:25:37 vmfsppjb006 dbus-daemon[12505]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:25:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:25:38 vmfsppjb006 setroubleshoot[12505]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:25:39 vmfsppjb006 setroubleshoot[12505]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:25:39 vmfsppjb006 platform-python[12505]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:26:01 vmfsppjb006 logrotate[12542]: ALERT exited abnormally with [1]
Oct 26 10:26:02 vmfsppjb006 rhsmd[12552]: In order for Subscription Manager to provide your system with updates, your system must be registered with the Customer Portal. Please enter your Red Hat login to ensure your system is up-to-date.
Oct 26 10:26:04 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:26:04 vmfsppjb006 dbus-daemon[12567]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:26:04 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:26:05 vmfsppjb006 setroubleshoot[12567]: failed to retrieve rpm info for /var/opt/microsoft/omsconfig/omsconfig.log
Oct 26 10:26:08 vmfsppjb006 setroubleshoot[12567]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log. For complete SELinux messages run: sealert -l 032b50b8-a43a-405d-88e8-f8bba97fe952
Oct 26 10:26:08 vmfsppjb006 platform-python[12567]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log.#012#012*****  Plugin restorecon (94.8 confidence) suggests   ************************#012#012If you want to fix the label. #012/var/opt/microsoft/omsconfig/omsconfig.log default label should be var_log_t.#012Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly.#012Do#012# /sbin/restorecon -v /var/opt/microsoft/omsconfig/omsconfig.log#012#012*****  Plugin catchall_labels (5.21 confidence) suggests   *******************#012#012If you want to allow logrotate to have getattr access on the omsconfig.log file#012Then you need to change the label on /var/opt/microsoft/omsconfig/omsconfig.log#012Do#012# semanage fcontext -a -t FILE_TYPE '/var/opt/microsoft/omsconfig/omsconfig.log'#012where FILE_TYPE is one of the following: NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_log_t, NetworkManager_tmp_t, NetworkManager_unit_file_t, NetworkManager_var_run_t, abrt_dump_oops_exec_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_worker_exec_t, abrt_tmp_t, abrt_unit_file_t, abrt_upload_watch_exec_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_log_t, abrt_var_run_t, abrt_watch_log_exec_t, accountsd_exec_t, accountsd_unit_file_t, acct_data_t, acct_exec_t, acct_initrc_exec_t, admin_crontab_tmp_t, admin_passwd_exec_t, afs_bosserver_exec_t, afs_exec_t, afs_fsserver_exec_t, afs_initrc_exec_t, afs_kaserver_exec_t, afs_logfile_t, afs_ptserver_exec_t, afs_vlserver_exec_t, aiccu_exec_t, aiccu_initrc_exec_t, aiccu_var_run_t, aide_exec_t, aide_log_t, ajaxterm_exec_t, ajaxterm_initrc_exec_t, ajaxterm_var_run_t, alsa_exec_t, alsa_tmp_t, alsa_unit_file_t, alsa_var_run_t, amanda_exec_t, amanda_inetd_exec_t, amanda_log_t, amanda_recover_exec_t, amanda_tmp_t, amanda_unit_file_t, amtu_exec_t, amtu_initrc_exec_t, anaconda_exec_t, anacron_exec_t, anon_inodefs_t, antivirus_exec_t, antivirus_initrc_exec_t, antivirus_log_t, antivirus_tmp_t, antivirus_unit_file_t, antivirus_var_run_t, apcupsd_cgi_script_exec_t, apcupsd_exec_t, apcupsd_initrc_exec_t, apcupsd_log_t, apcupsd_tmp_t, apcupsd_unit_file_t, apcupsd_var_run_t, apm_exec_t, apmd_exec_t, apmd_initrc_exec_t, apmd_log_t, apmd_tmp_t, apmd_unit_file_t, apmd_var_run_t, arpwatch_exec_t, arpwatch_initrc_exec_t, arpwatch_tmp_t, arpwatch_unit_file_t, arpwatch_var_run_t, asterisk_exec_t, asterisk_initrc_exec_t, asterisk_log_t, asterisk_tmp_t, asterisk_var_run_t, audisp_exec_t, audisp_remote_exec_t, audisp_var_run_t, auditadm_sudo_tmp_t, auditctl_exec_t, auditd_exec_t, auditd_initrc_exec_t, auditd_log_t, auditd_tmp_t, auditd_unit_file_t, auditd_var_run_t, auoms_exec_t, auth_cache_t, authconfig_exec_t, automount_exec_t, automount_initrc_exec_t, automount_tmp_t, automount_unit_file_t, automount_var_run_t, avahi_exec_t, avahi_initrc_exec_t, avahi_unit_file_t, avahi_var_run_t, awstats_exec_t, awstats_script_exec_t, awstats_tmp_t, bacula_admin_exec_t, bacula_exec_t, bacula_initrc_exec_t, bacula_log_t, bacula_tmp_t, bacula_unconfined_script_exec_t, bacula_var_run_t, bcfg2_exec_t, bcfg2_initrc_exec_t, bcfg2_unit_file_t, bcfg2_var_run_t, bin_t, bitlbee_exec_t, bitlbee_initrc_exec_t, bitlbee_log_t, bitlbee_tmp_t, bitlbee_var_run_t, blkmapd_exec_t, blkmapd_initrc_exec_t, blkmapd_var_run_t, blktap_exec_t, blktap_var_run_t, blueman_exec_t, blueman_tmp_t, blueman_var_run_t, bluetooth_exec_t, bluetooth_helper_exec_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_initrc_exec_t, bluetooth_tmp_t, bluetooth_unit_file_t, bluetooth_var_run_t, boinc_exec_t, boinc_initrc_exec_t, boinc_log_t, boinc_project_tmp_t, boinc_tmp_t, boinc_unit_file_t, boltd_exec_t, boltd_var_run_t, boot_t, bootloader_exec_t, bootloader_tmp_t, bootloader_var_run_t, brctl_exec_t, brltty_exec_t, brltty_log_t, brltty_unit_file_t, brltty_var_run_t, bugzilla_script_exec_t, bugzilla_tmp_t, bumblebee_exec_t, bumblebee_unit_file_t, bumblebee_var_run_t, cachefilesd_exec_t, cachefilesd_var_run_t, calamaris_exec_t, calamaris_log_t, callweaver_exec_t, callweaver_initrc_exec_t, callweaver_log_t, callweaver_var_run_t, canna_exec_t, canna_initrc_exec_t, canna_log_t, canna_var_run_t, cardctl_exec_t, cardmgr_dev_t, cardmgr_exec_t, cardmgr_var_run_t, ccs_exec_t, ccs_initrc_exec_t, ccs_tmp_t, ccs_var_lib_t, ccs_var_log_t, ccs_var_run_t, cdcc_exec_t, cdcc_tmp_t, cdrecord_exec_t, cert_t, certmaster_exec_t, certmaster_initrc_exec_t, certmaster_var_log_t, certmaster_var_run_t, certmonger_exec_t, certmonger_initrc_exec_t, certmonger_tmp_t, certmonger_unconfined_exec_t, certmonger_unit_file_t, certmonger_var_run_t, certwatch_exec_t, cfengine_execd_exec_t, cfengine_initrc_exec_t, cfengine_log_t, cfengine_monitord_exec_t, cfengine_serverd_exec_t, cgclear_exec_t, cgconfig_exec_t, cgconfig_initrc_exec_t, cgdcbxd_exec_t, cgdcbxd_unit_file_t, cgdcbxd_var_run_t, cgred_exec_t, cgred_initrc_exec_t, cgred_log_t, cgred_var_run_t, cgroup_t, checkpc_exec_t, checkpc_log_t, checkpolicy_exec_t, chfn_exec_t, chkpwd_exec_t, chrome_sandbox_exec_t, chrome_sandbox_nacl_exec_t, chrome_sandbox_tmp_t, chronyc_exec_t, chronyd_exec_t, chronyd_initrc_exec_t, chronyd_keys_t, chronyd_tmp_t, chronyd_unit_file_t, chronyd_var_log_t, chronyd_var_run_t, chroot_exec_t, cifs_t, cinder_api_exec_t, cinder_api_tmp_t, cinder_api_unit_file_t, cinder_backup_exec_t, cinder_backup_tmp_t, cinder_backup_unit_file_t, cinder_log_t, cinder_scheduler_exec_t, cinder_scheduler_tmp_t, cinder_scheduler_unit_file_t, cinder_var_run_t, cinder_volume_exec_t, cinder_volume_tmp_t, cinder_volume_unit_file_t, ciped_exec_t, ciped_initrc_exec_t, clogd_exec_t, clogd_var_run_t, cloud_init_exec_t, cloud_init_tmp_t, cloud_init_unit_file_t, cloud_log_t, cluster_conf_t, cluster_exec_t, cluster_initrc_exec_t, cluster_tmp_t, cluster_unit_file_t, cluster_var_lib_t, cluster_var_log_t, cluster_var_run_t, clvmd_exec_t, clvmd_initrc_exec_t, clvmd_var_run_t, cmirrord_exec_t, cmirrord_initrc_exec_t, cmirrord_var_run_t, cobbler_tmp_t, cobbler_var_log_t, cobblerd_exec_t, cobblerd_initrc_exec_t, cockpit_session_exec_t, cockpit_tmp_t, cockpit_tmpfs_t, cockpit_unit_file_t, cockpit_var_run_t, cockpit_ws_exec_t, collectd_exec_t, collectd_initrc_exec_t, collectd_log_t, collectd_script_exec_t, collectd_script_tmp_t, collectd_unit_file_t, collectd_var_run_t, colord_exec_t, colord_tmp_t, colord_unit_file_t, comsat_exec_t, comsat_tmp_t, comsat_var_run_t, condor_collector_exec_t, condor_initrc_exec_t, condor_log_t, condor_master_exec_t, condor_master_tmp_t, condor_negotiator_exec_t, condor_procd_exec_t, condor_schedd_exec_t, condor_schedd_tmp_t, condor_startd_exec_t, condor_startd_tmp_t, condor_unit_file_t, condor_var_run_t, conman_exec_t, conman_log_t, conman_tmp_t, conman_unconfined_script_exec_t, conman_unit_file_t, conman_var_run_t, conntrackd_exec_t, conntrackd_initrc_exec_t, conntrackd_log_t, conntrackd_unit_file_t, conntrackd_var_run_t, consolehelper_exec_t, consolekit_exec_t, consolekit_log_t, consolekit_unit_file_t, consolekit_var_run_t, couchdb_exec_t, couchdb_initrc_exec_t, couchdb_log_t, couchdb_tmp_t, couchdb_unit_file_t, couchdb_var_run_t, courier_authdaemon_exec_t, courier_exec_t, courier_pcp_exec_t, courier_pop_exec_t, courier_sqwebmail_exec_t, courier_tcpd_exec_t, courier_var_run_t, cpu_online_t, cpucontrol_exec_t, cpufreqselector_exec_t, cpuplug_exec_t, cpuplug_initrc_exec_t, cpuplug_var_run_t, cpuspeed_exec_t, cpuspeed_var_run_t, crack_exec_t, crack_tmp_t, cron_log_t, cron_var_run_t, crond_exec_t, crond_initrc_exec_t, crond_tmp_t, crond_unit_file_t, crond_var_run_t, crontab_exec_t, crontab_tmp_t, ctdbd_exec_t, ctdbd_initrc_exec_t, ctdbd_log_t, ctdbd_tmp_t, ctdbd_var_run_t, cups_pdf_exec_t, cups_pdf_tmp_t, cupsd_config_exec_t, cupsd_config_var_run_t, cupsd_exec_t, cupsd_initrc_exec_t, cupsd_log_t, cupsd_lpd_exec_t, cupsd_lpd_tmp_t, cupsd_lpd_var_run_t, cupsd_tmp_t, cupsd_unit_file_t, cupsd_var_run_t, cvs_exec_t, cvs_initrc
Oct 26 10:26:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:26:37 vmfsppjb006 dbus-daemon[12611]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:26:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:26:38 vmfsppjb006 setroubleshoot[12611]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:26:39 vmfsppjb006 setroubleshoot[12611]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:26:39 vmfsppjb006 platform-python[12611]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:35:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:35:37 vmfsppjb006 dbus-daemon[13121]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:35:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:35:38 vmfsppjb006 setroubleshoot[13121]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:35:39 vmfsppjb006 setroubleshoot[13121]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:35:39 vmfsppjb006 platform-python[13121]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Started Session c3 of user root.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Reached target Paths.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Reached target Timers.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Starting D-Bus User Message Bus Socket.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Listening on D-Bus User Message Bus Socket.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Reached target Sockets.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Reached target Basic System.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Reached target Default.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Startup finished in 53ms.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Stopped target Default.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Stopped target Basic System.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Stopped target Paths.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Stopped target Timers.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Stopped target Sockets.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Closed D-Bus User Message Bus Socket.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Reached target Shutdown.
Oct 26 10:36:49 vmfsppjb006 systemd[13279]: Starting Exit the Session...
Oct 26 10:36:49 vmfsppjb006 systemd[1]: user@0.service: Killing process 13314 (systemctl) with signal SIGKILL.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 10:36:49 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 10:36:57 vmfsppjb006 python3.6[1625]: 2021-10-26T01:36:57.011730Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 3;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 10:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:37:37 vmfsppjb006 dbus-daemon[13376]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:37:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:37:38 vmfsppjb006 setroubleshoot[13376]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:37:39 vmfsppjb006 setroubleshoot[13376]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:37:39 vmfsppjb006 platform-python[13376]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:38:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:38:37 vmfsppjb006 dbus-daemon[13438]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:38:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:38:38 vmfsppjb006 setroubleshoot[13438]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:38:39 vmfsppjb006 setroubleshoot[13438]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:38:39 vmfsppjb006 platform-python[13438]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 10:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 10:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 10:39:01 vmfsppjb006 systemd[1]: Started Session 19 of user omsagent.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Reached target Paths.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Starting D-Bus User Message Bus Socket.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Reached target Timers.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Listening on D-Bus User Message Bus Socket.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Reached target Sockets.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Reached target Basic System.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Reached target Default.
Oct 26 10:39:02 vmfsppjb006 systemd[13472]: Startup finished in 48ms.
Oct 26 10:39:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 10:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Stopped target Default.
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Stopped target Basic System.
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Stopped target Paths.
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Stopped target Sockets.
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Closed D-Bus User Message Bus Socket.
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Reached target Shutdown.
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Stopped target Timers.
Oct 26 10:39:04 vmfsppjb006 systemd[13472]: Starting Exit the Session...
Oct 26 10:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 13590 (systemctl) with signal SIGKILL.
Oct 26 10:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 10:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 10:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 10:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 10:39:38 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:39:38 vmfsppjb006 dbus-daemon[13625]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:39:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:39:38 vmfsppjb006 setroubleshoot[13625]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:39:39 vmfsppjb006 setroubleshoot[13625]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:39:39 vmfsppjb006 platform-python[13625]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:41:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:41:37 vmfsppjb006 dbus-daemon[13752]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:41:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:41:37 vmfsppjb006 setroubleshoot[13752]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:41:38 vmfsppjb006 setroubleshoot[13752]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:41:38 vmfsppjb006 platform-python[13752]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 10:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 10:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 10:54:01 vmfsppjb006 systemd[1]: Started Session 21 of user omsagent.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Reached target Paths.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Reached target Timers.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Starting D-Bus User Message Bus Socket.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Listening on D-Bus User Message Bus Socket.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Reached target Sockets.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Reached target Basic System.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Reached target Default.
Oct 26 10:54:01 vmfsppjb006 systemd[14446]: Startup finished in 50ms.
Oct 26 10:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 10:54:09 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:54:09 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Stopped target Default.
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Stopped target Basic System.
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Stopped target Timers.
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Stopped target Sockets.
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Closed D-Bus User Message Bus Socket.
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Stopped target Paths.
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Reached target Shutdown.
Oct 26 10:54:09 vmfsppjb006 systemd[14446]: Starting Exit the Session...
Oct 26 10:54:09 vmfsppjb006 systemd[1]: user@986.service: Killing process 14577 (systemctl) with signal SIGKILL.
Oct 26 10:54:09 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:54:09 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 10:54:09 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 10:54:09 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 10:54:09 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 10:54:09 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 10:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:54:37 vmfsppjb006 dbus-daemon[14612]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:54:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:54:38 vmfsppjb006 setroubleshoot[14612]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:54:38 vmfsppjb006 setroubleshoot[14612]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:54:38 vmfsppjb006 platform-python[14612]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 10:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 10:55:37 vmfsppjb006 dbus-daemon[14673]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 10:55:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 10:55:38 vmfsppjb006 setroubleshoot[14673]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 10:55:38 vmfsppjb006 setroubleshoot[14673]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 10:55:38 vmfsppjb006 platform-python[14673]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:00:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:00:37 vmfsppjb006 dbus-daemon[14963]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:00:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:00:38 vmfsppjb006 setroubleshoot[14963]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:00:38 vmfsppjb006 setroubleshoot[14963]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:00:38 vmfsppjb006 platform-python[14963]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:06:21 vmfsppjb006 python3.6[1625]: 2021-10-26T02:06:21.219037Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Started Session c4 of user root.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Starting D-Bus User Message Bus Socket.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Reached target Timers.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Reached target Paths.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Listening on D-Bus User Message Bus Socket.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Reached target Sockets.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Reached target Basic System.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Reached target Default.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Startup finished in 60ms.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Stopped target Default.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Stopped target Basic System.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Stopped target Paths.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Stopped target Timers.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Stopped target Sockets.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Closed D-Bus User Message Bus Socket.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Reached target Shutdown.
Oct 26 11:06:51 vmfsppjb006 systemd[15401]: Starting Exit the Session...
Oct 26 11:06:51 vmfsppjb006 systemd[1]: user@0.service: Killing process 15438 (systemctl) with signal SIGKILL.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 11:06:51 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 11:06:57 vmfsppjb006 python3.6[1625]: 2021-10-26T02:06:57.393956Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 4;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 11:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:07:37 vmfsppjb006 dbus-daemon[15498]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:07:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:07:38 vmfsppjb006 setroubleshoot[15498]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:07:38 vmfsppjb006 setroubleshoot[15498]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:07:38 vmfsppjb006 platform-python[15498]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 11:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 11:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 11:09:01 vmfsppjb006 systemd[1]: Started Session 24 of user omsagent.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Reached target Timers.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Starting D-Bus User Message Bus Socket.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Reached target Paths.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Listening on D-Bus User Message Bus Socket.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Reached target Sockets.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Reached target Basic System.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Reached target Default.
Oct 26 11:09:02 vmfsppjb006 systemd[15597]: Startup finished in 50ms.
Oct 26 11:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 11:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Stopped target Default.
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Stopped target Basic System.
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Stopped target Paths.
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Stopped target Timers.
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Stopped target Sockets.
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Closed D-Bus User Message Bus Socket.
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Reached target Shutdown.
Oct 26 11:09:04 vmfsppjb006 systemd[15597]: Starting Exit the Session...
Oct 26 11:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 11:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 11:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 11:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 11:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:09:37 vmfsppjb006 dbus-daemon[15751]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:09:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:09:38 vmfsppjb006 setroubleshoot[15751]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:09:38 vmfsppjb006 setroubleshoot[15751]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:09:38 vmfsppjb006 platform-python[15751]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:10:37 vmfsppjb006 dbus-daemon[15816]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:10:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:10:38 vmfsppjb006 setroubleshoot[15816]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:10:38 vmfsppjb006 setroubleshoot[15816]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:10:38 vmfsppjb006 platform-python[15816]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:16:12 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 11:16:12 vmfsppjb006 dnf[16128]: Metadata cache refreshed recently.
Oct 26 11:16:12 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 11:16:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:16:37 vmfsppjb006 dbus-daemon[16165]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:16:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:16:38 vmfsppjb006 setroubleshoot[16165]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:16:39 vmfsppjb006 setroubleshoot[16165]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:16:39 vmfsppjb006 platform-python[16165]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 11:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 11:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 11:24:01 vmfsppjb006 systemd[1]: Started Session 26 of user omsagent.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Starting D-Bus User Message Bus Socket.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Reached target Paths.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Reached target Timers.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Listening on D-Bus User Message Bus Socket.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Reached target Sockets.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Reached target Basic System.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Reached target Default.
Oct 26 11:24:01 vmfsppjb006 systemd[16584]: Startup finished in 50ms.
Oct 26 11:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 11:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Stopped target Default.
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Stopped target Basic System.
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Stopped target Timers.
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Stopped target Sockets.
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Closed D-Bus User Message Bus Socket.
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Stopped target Paths.
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Reached target Shutdown.
Oct 26 11:24:04 vmfsppjb006 systemd[16584]: Starting Exit the Session...
Oct 26 11:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 16704 (systemctl) with signal SIGKILL.
Oct 26 11:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 11:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 11:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 11:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 11:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:24:37 vmfsppjb006 dbus-daemon[16740]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:24:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:24:38 vmfsppjb006 setroubleshoot[16740]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:24:39 vmfsppjb006 setroubleshoot[16740]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:24:39 vmfsppjb006 platform-python[16740]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:25:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:25:37 vmfsppjb006 dbus-daemon[16810]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:25:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:25:38 vmfsppjb006 setroubleshoot[16810]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:25:39 vmfsppjb006 setroubleshoot[16810]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:25:39 vmfsppjb006 platform-python[16810]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Started Session c5 of user root.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Reached target Paths.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Reached target Timers.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Starting D-Bus User Message Bus Socket.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Listening on D-Bus User Message Bus Socket.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Reached target Sockets.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Reached target Basic System.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Reached target Default.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Startup finished in 53ms.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Stopped target Default.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Stopped target Basic System.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Stopped target Sockets.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Closed D-Bus User Message Bus Socket.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Stopped target Timers.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Stopped target Paths.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Reached target Shutdown.
Oct 26 11:36:53 vmfsppjb006 systemd[17524]: Starting Exit the Session...
Oct 26 11:36:53 vmfsppjb006 systemd[1]: user@0.service: Killing process 17560 (systemctl) with signal SIGKILL.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 11:36:53 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 11:37:01 vmfsppjb006 python3.6[1625]: 2021-10-26T02:37:01.399787Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 5;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 11:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:37:37 vmfsppjb006 dbus-daemon[17620]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:37:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:37:38 vmfsppjb006 setroubleshoot[17620]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:37:39 vmfsppjb006 setroubleshoot[17620]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:37:39 vmfsppjb006 platform-python[17620]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 11:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 11:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 11:39:01 vmfsppjb006 systemd[1]: Started Session 29 of user omsagent.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Starting D-Bus User Message Bus Socket.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Reached target Timers.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Reached target Paths.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Listening on D-Bus User Message Bus Socket.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Reached target Sockets.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Reached target Basic System.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Reached target Default.
Oct 26 11:39:02 vmfsppjb006 systemd[17708]: Startup finished in 45ms.
Oct 26 11:39:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 11:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Stopped target Default.
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Stopped target Basic System.
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Stopped target Sockets.
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Closed D-Bus User Message Bus Socket.
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Stopped target Timers.
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Stopped target Paths.
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Reached target Shutdown.
Oct 26 11:39:04 vmfsppjb006 systemd[17708]: Starting Exit the Session...
Oct 26 11:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 17826 (systemctl) with signal SIGKILL.
Oct 26 11:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 11:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 11:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 11:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 11:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:39:37 vmfsppjb006 dbus-daemon[17861]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:39:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:39:38 vmfsppjb006 setroubleshoot[17861]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:39:39 vmfsppjb006 setroubleshoot[17861]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:39:39 vmfsppjb006 platform-python[17861]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:40:37 vmfsppjb006 dbus-daemon[17932]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:40:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:40:38 vmfsppjb006 setroubleshoot[17932]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:40:39 vmfsppjb006 setroubleshoot[17932]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:40:39 vmfsppjb006 platform-python[17932]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:45:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:45:37 vmfsppjb006 dbus-daemon[18229]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:45:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:45:38 vmfsppjb006 setroubleshoot[18229]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:45:39 vmfsppjb006 setroubleshoot[18229]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:45:39 vmfsppjb006 platform-python[18229]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 11:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 11:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 11:54:01 vmfsppjb006 systemd[1]: Started Session 31 of user omsagent.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Starting D-Bus User Message Bus Socket.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Reached target Paths.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Reached target Timers.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Listening on D-Bus User Message Bus Socket.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Reached target Sockets.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Reached target Basic System.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Reached target Default.
Oct 26 11:54:01 vmfsppjb006 systemd[18701]: Startup finished in 45ms.
Oct 26 11:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 11:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Stopped target Default.
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Stopped target Basic System.
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Stopped target Timers.
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Stopped target Sockets.
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Closed D-Bus User Message Bus Socket.
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Stopped target Paths.
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Reached target Shutdown.
Oct 26 11:54:03 vmfsppjb006 systemd[18701]: Starting Exit the Session...
Oct 26 11:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 18820 (systemctl) with signal SIGKILL.
Oct 26 11:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 11:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 11:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 11:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 11:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 11:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:54:37 vmfsppjb006 dbus-daemon[18855]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:54:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:54:37 vmfsppjb006 setroubleshoot[18855]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:54:38 vmfsppjb006 setroubleshoot[18855]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:54:38 vmfsppjb006 platform-python[18855]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 11:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 11:55:37 vmfsppjb006 dbus-daemon[18926]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 11:55:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 11:55:37 vmfsppjb006 setroubleshoot[18926]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 11:55:38 vmfsppjb006 setroubleshoot[18926]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 11:55:38 vmfsppjb006 platform-python[18926]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:06:25 vmfsppjb006 python3.6[1625]: 2021-10-26T03:06:25.220671Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 12:06:54 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 12:06:54 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 12:06:54 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 12:06:54 vmfsppjb006 systemd[1]: Started Session c6 of user root.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Reached target Timers.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Starting D-Bus User Message Bus Socket.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Reached target Paths.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Listening on D-Bus User Message Bus Socket.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Reached target Sockets.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Reached target Basic System.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Reached target Default.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Startup finished in 49ms.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Stopped target Default.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Stopped target Basic System.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Stopped target Paths.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Stopped target Timers.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Stopped target Sockets.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Closed D-Bus User Message Bus Socket.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Reached target Shutdown.
Oct 26 12:06:55 vmfsppjb006 systemd[19643]: Starting Exit the Session...
Oct 26 12:06:55 vmfsppjb006 systemd[1]: user@0.service: Killing process 19679 (systemctl) with signal SIGKILL.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 12:06:55 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 12:06:55 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 12:07:07 vmfsppjb006 python3.6[1625]: 2021-10-26T03:07:07.412219Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 6;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 12:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:07:37 vmfsppjb006 dbus-daemon[19741]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:07:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:07:38 vmfsppjb006 setroubleshoot[19741]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:07:38 vmfsppjb006 setroubleshoot[19741]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:07:38 vmfsppjb006 platform-python[19741]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 12:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 12:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 12:09:01 vmfsppjb006 systemd[1]: Started Session 34 of user omsagent.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Reached target Timers.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Reached target Paths.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Starting D-Bus User Message Bus Socket.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Listening on D-Bus User Message Bus Socket.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Reached target Sockets.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Reached target Basic System.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Reached target Default.
Oct 26 12:09:01 vmfsppjb006 systemd[19828]: Startup finished in 53ms.
Oct 26 12:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 12:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Stopped target Default.
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Stopped target Basic System.
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Stopped target Paths.
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Stopped target Sockets.
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Closed D-Bus User Message Bus Socket.
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Stopped target Timers.
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Reached target Shutdown.
Oct 26 12:09:03 vmfsppjb006 systemd[19828]: Starting Exit the Session...
Oct 26 12:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 19946 (systemctl) with signal SIGKILL.
Oct 26 12:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 12:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 12:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 12:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 12:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:09:37 vmfsppjb006 dbus-daemon[19990]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:09:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:09:38 vmfsppjb006 setroubleshoot[19990]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:09:38 vmfsppjb006 setroubleshoot[19990]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:09:38 vmfsppjb006 platform-python[19990]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:10:37 vmfsppjb006 dbus-daemon[20046]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:10:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:10:38 vmfsppjb006 setroubleshoot[20046]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:10:38 vmfsppjb006 setroubleshoot[20046]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:10:38 vmfsppjb006 platform-python[20046]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:16:14 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 12:16:15 vmfsppjb006 dnf[20365]: packages-microsoft-com-prod                      12 kB/s | 3.0 kB     00:00
Oct 26 12:16:15 vmfsppjb006 dnf[20365]: MySQL 8.0 Community Server                       69 kB/s | 2.6 kB     00:00
Oct 26 12:16:15 vmfsppjb006 dnf[20365]: MySQL Connectors Community                       56 kB/s | 2.6 kB     00:00
Oct 26 12:16:15 vmfsppjb006 dnf[20365]: MySQL Tools Community                           200 kB/s | 2.6 kB     00:00
Oct 26 12:16:16 vmfsppjb006 dnf[20365]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.1 kB/s | 2.4 kB     00:00
Oct 26 12:16:17 vmfsppjb006 dnf[20365]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.9 kB/s | 2.8 kB     00:00
Oct 26 12:16:17 vmfsppjb006 dnf[20365]: Microsoft Azure RPMs for RHEL8 Extended Update  6.2 kB/s | 2.1 kB     00:00
Oct 26 12:16:17 vmfsppjb006 dnf[20365]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 26 12:16:18 vmfsppjb006 dnf[20365]: Zabbix Official Repository non-supported - x86_  13 kB/s | 3.0 kB     00:00
Oct 26 12:16:19 vmfsppjb006 dnf[20365]: Metadata cache created.
Oct 26 12:16:19 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 12:16:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:16:37 vmfsppjb006 dbus-daemon[20412]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:16:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:16:38 vmfsppjb006 setroubleshoot[20412]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:16:38 vmfsppjb006 setroubleshoot[20412]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:16:38 vmfsppjb006 platform-python[20412]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:21:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:21:37 vmfsppjb006 dbus-daemon[20694]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:21:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:21:38 vmfsppjb006 setroubleshoot[20694]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:21:38 vmfsppjb006 setroubleshoot[20694]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:21:38 vmfsppjb006 platform-python[20694]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:24:02 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 12:24:02 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 12:24:02 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 12:24:02 vmfsppjb006 systemd[1]: Started Session 36 of user omsagent.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Reached target Timers.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Reached target Paths.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Starting D-Bus User Message Bus Socket.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Listening on D-Bus User Message Bus Socket.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Reached target Sockets.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Reached target Basic System.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Reached target Default.
Oct 26 12:24:02 vmfsppjb006 systemd[20840]: Startup finished in 46ms.
Oct 26 12:24:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 12:24:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:24:05 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Stopped target Default.
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Stopped target Basic System.
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Stopped target Paths.
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Stopped target Timers.
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Stopped target Sockets.
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Closed D-Bus User Message Bus Socket.
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Reached target Shutdown.
Oct 26 12:24:05 vmfsppjb006 systemd[20840]: Starting Exit the Session...
Oct 26 12:24:05 vmfsppjb006 systemd[1]: user@986.service: Killing process 20959 (systemctl) with signal SIGKILL.
Oct 26 12:24:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:24:05 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 12:24:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:24:05 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 12:24:05 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 12:24:05 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 12:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:24:37 vmfsppjb006 dbus-daemon[20995]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:24:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:24:38 vmfsppjb006 setroubleshoot[20995]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:24:38 vmfsppjb006 setroubleshoot[20995]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:24:38 vmfsppjb006 platform-python[20995]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:30:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:30:37 vmfsppjb006 dbus-daemon[21342]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:30:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:30:38 vmfsppjb006 setroubleshoot[21342]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:30:39 vmfsppjb006 setroubleshoot[21342]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:30:39 vmfsppjb006 platform-python[21342]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:36:56 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 12:36:56 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 12:36:56 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 12:36:56 vmfsppjb006 systemd[1]: Started Session c7 of user root.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Starting D-Bus User Message Bus Socket.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Reached target Paths.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Reached target Timers.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Listening on D-Bus User Message Bus Socket.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Reached target Sockets.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Reached target Basic System.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Reached target Default.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Startup finished in 51ms.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Stopped target Default.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Stopped target Basic System.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Stopped target Sockets.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Stopped target Paths.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Stopped target Timers.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Closed D-Bus User Message Bus Socket.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Reached target Shutdown.
Oct 26 12:36:57 vmfsppjb006 systemd[21779]: Starting Exit the Session...
Oct 26 12:36:57 vmfsppjb006 systemd[1]: user@0.service: Killing process 21815 (systemctl) with signal SIGKILL.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 12:36:57 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 12:36:57 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 12:37:08 vmfsppjb006 python3.6[1625]: 2021-10-26T03:37:08.850550Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 7;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 12:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:37:37 vmfsppjb006 dbus-daemon[21864]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:37:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:37:38 vmfsppjb006 setroubleshoot[21864]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:37:39 vmfsppjb006 setroubleshoot[21864]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:37:39 vmfsppjb006 platform-python[21864]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 12:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 12:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 12:39:01 vmfsppjb006 systemd[1]: Started Session 39 of user omsagent.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Reached target Paths.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Starting D-Bus User Message Bus Socket.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Reached target Timers.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Listening on D-Bus User Message Bus Socket.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Reached target Sockets.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Reached target Basic System.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Reached target Default.
Oct 26 12:39:01 vmfsppjb006 systemd[21963]: Startup finished in 49ms.
Oct 26 12:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 12:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Stopped target Default.
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Stopped target Basic System.
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Stopped target Sockets.
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Stopped target Paths.
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Stopped target Timers.
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Closed D-Bus User Message Bus Socket.
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Reached target Shutdown.
Oct 26 12:39:03 vmfsppjb006 systemd[21963]: Starting Exit the Session...
Oct 26 12:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 22081 (systemctl) with signal SIGKILL.
Oct 26 12:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 12:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 12:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 12:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 12:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:39:37 vmfsppjb006 dbus-daemon[22117]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:39:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:39:38 vmfsppjb006 setroubleshoot[22117]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:39:39 vmfsppjb006 setroubleshoot[22117]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:39:39 vmfsppjb006 platform-python[22117]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:40:37 vmfsppjb006 dbus-daemon[22183]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:40:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:40:38 vmfsppjb006 setroubleshoot[22183]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:40:39 vmfsppjb006 setroubleshoot[22183]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:40:39 vmfsppjb006 platform-python[22183]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 12:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 12:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 12:54:01 vmfsppjb006 systemd[1]: Started Session 41 of user omsagent.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Starting D-Bus User Message Bus Socket.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Reached target Timers.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Reached target Paths.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Listening on D-Bus User Message Bus Socket.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Reached target Sockets.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Reached target Basic System.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Reached target Default.
Oct 26 12:54:01 vmfsppjb006 systemd[22935]: Startup finished in 48ms.
Oct 26 12:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 12:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:54:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Stopped target Default.
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Stopped target Basic System.
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Stopped target Timers.
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Stopped target Sockets.
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Stopped target Paths.
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Closed D-Bus User Message Bus Socket.
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Reached target Shutdown.
Oct 26 12:54:04 vmfsppjb006 systemd[22935]: Starting Exit the Session...
Oct 26 12:54:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 23055 (systemctl) with signal SIGKILL.
Oct 26 12:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:54:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 12:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 12:54:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 12:54:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 12:54:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 12:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:54:37 vmfsppjb006 dbus-daemon[23091]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:54:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:54:38 vmfsppjb006 setroubleshoot[23091]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:54:39 vmfsppjb006 setroubleshoot[23091]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:54:39 vmfsppjb006 platform-python[23091]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 12:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 12:55:37 vmfsppjb006 dbus-daemon[23162]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 12:55:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 12:55:38 vmfsppjb006 setroubleshoot[23162]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 12:55:39 vmfsppjb006 setroubleshoot[23162]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 12:55:39 vmfsppjb006 platform-python[23162]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:05:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:05:37 vmfsppjb006 dbus-daemon[23730]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:05:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:05:37 vmfsppjb006 setroubleshoot[23730]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:05:38 vmfsppjb006 setroubleshoot[23730]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:05:38 vmfsppjb006 platform-python[23730]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:06:27 vmfsppjb006 python3.6[1625]: 2021-10-26T04:06:27.103128Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 13:06:58 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 13:06:58 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 13:06:58 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 13:06:58 vmfsppjb006 systemd[1]: Started Session c8 of user root.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Starting D-Bus User Message Bus Socket.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Reached target Timers.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Reached target Paths.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Listening on D-Bus User Message Bus Socket.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Reached target Sockets.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Reached target Basic System.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Reached target Default.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Startup finished in 46ms.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Stopped target Default.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Stopped target Basic System.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Stopped target Sockets.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Stopped target Timers.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Stopped target Paths.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Closed D-Bus User Message Bus Socket.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Reached target Shutdown.
Oct 26 13:06:59 vmfsppjb006 systemd[23892]: Starting Exit the Session...
Oct 26 13:06:59 vmfsppjb006 systemd[1]: user@0.service: Killing process 23926 (systemctl) with signal SIGKILL.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 13:06:59 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 13:06:59 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 13:07:09 vmfsppjb006 python3.6[1625]: 2021-10-26T04:07:09.295951Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 8;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 13:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:07:37 vmfsppjb006 dbus-daemon[23988]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:07:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:07:37 vmfsppjb006 setroubleshoot[23988]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:07:38 vmfsppjb006 setroubleshoot[23988]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:07:38 vmfsppjb006 platform-python[23988]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:08:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:08:37 vmfsppjb006 dbus-daemon[24050]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:08:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:08:37 vmfsppjb006 setroubleshoot[24050]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:08:38 vmfsppjb006 setroubleshoot[24050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:08:38 vmfsppjb006 platform-python[24050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 13:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 13:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 13:09:01 vmfsppjb006 systemd[1]: Started Session 44 of user omsagent.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Starting D-Bus User Message Bus Socket.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Reached target Paths.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Reached target Timers.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Listening on D-Bus User Message Bus Socket.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Reached target Sockets.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Reached target Basic System.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Reached target Default.
Oct 26 13:09:01 vmfsppjb006 systemd[24084]: Startup finished in 49ms.
Oct 26 13:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 13:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Stopped target Default.
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Stopped target Basic System.
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Stopped target Timers.
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Stopped target Paths.
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Stopped target Sockets.
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Closed D-Bus User Message Bus Socket.
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Reached target Shutdown.
Oct 26 13:09:03 vmfsppjb006 systemd[24084]: Starting Exit the Session...
Oct 26 13:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 24202 (systemctl) with signal SIGKILL.
Oct 26 13:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 13:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 13:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 13:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 13:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:09:37 vmfsppjb006 dbus-daemon[24237]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:09:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:09:37 vmfsppjb006 setroubleshoot[24237]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:09:38 vmfsppjb006 setroubleshoot[24237]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:09:38 vmfsppjb006 platform-python[24237]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:11:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:11:37 vmfsppjb006 dbus-daemon[24363]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:11:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:11:38 vmfsppjb006 setroubleshoot[24363]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:11:38 vmfsppjb006 setroubleshoot[24363]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:11:38 vmfsppjb006 platform-python[24363]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:16:19 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 13:16:19 vmfsppjb006 dnf[24625]: Metadata cache refreshed recently.
Oct 26 13:16:19 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 13:17:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:17:37 vmfsppjb006 dbus-daemon[24705]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:17:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:17:38 vmfsppjb006 setroubleshoot[24705]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:17:38 vmfsppjb006 setroubleshoot[24705]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:17:38 vmfsppjb006 platform-python[24705]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 13:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 13:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 13:24:01 vmfsppjb006 systemd[1]: Started Session 46 of user omsagent.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Reached target Paths.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Starting D-Bus User Message Bus Socket.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Reached target Timers.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Listening on D-Bus User Message Bus Socket.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Reached target Sockets.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Reached target Basic System.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Reached target Default.
Oct 26 13:24:01 vmfsppjb006 systemd[25071]: Startup finished in 45ms.
Oct 26 13:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Stopped target Default.
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Stopped target Basic System.
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Stopped target Paths.
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Stopped target Sockets.
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Closed D-Bus User Message Bus Socket.
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Reached target Shutdown.
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Starting Exit the Session...
Oct 26 13:24:03 vmfsppjb006 systemd[25071]: Stopped target Timers.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 25191 (systemctl) with signal SIGKILL.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 13:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 13:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 13:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:24:37 vmfsppjb006 dbus-daemon[25232]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:24:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:24:38 vmfsppjb006 setroubleshoot[25232]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:24:38 vmfsppjb006 setroubleshoot[25232]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:24:38 vmfsppjb006 platform-python[25232]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:25:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:25:37 vmfsppjb006 dbus-daemon[25297]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:25:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:25:38 vmfsppjb006 setroubleshoot[25297]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:25:38 vmfsppjb006 setroubleshoot[25297]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:25:38 vmfsppjb006 platform-python[25297]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:37:00 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 13:37:00 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 13:37:00 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 13:37:00 vmfsppjb006 systemd[1]: Started Session c9 of user root.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Reached target Paths.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Starting D-Bus User Message Bus Socket.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Reached target Timers.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Listening on D-Bus User Message Bus Socket.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Reached target Sockets.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Reached target Basic System.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Reached target Default.
Oct 26 13:37:00 vmfsppjb006 systemd[26025]: Startup finished in 48ms.
Oct 26 13:37:00 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Stopped target Default.
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Stopped target Basic System.
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Stopped target Paths.
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Stopped target Sockets.
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Closed D-Bus User Message Bus Socket.
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Reached target Shutdown.
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Starting Exit the Session...
Oct 26 13:37:01 vmfsppjb006 systemd[26025]: Stopped target Timers.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: user@0.service: Killing process 26060 (systemctl) with signal SIGKILL.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 13:37:01 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 13:37:01 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 13:37:10 vmfsppjb006 python3.6[1625]: 2021-10-26T04:37:10.464877Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 9;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 13:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:37:37 vmfsppjb006 dbus-daemon[26108]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:37:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:37:38 vmfsppjb006 setroubleshoot[26108]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:37:39 vmfsppjb006 setroubleshoot[26108]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:37:39 vmfsppjb006 platform-python[26108]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 13:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 13:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 13:39:01 vmfsppjb006 systemd[1]: Started Session 49 of user omsagent.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Reached target Paths.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Reached target Timers.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Starting D-Bus User Message Bus Socket.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Listening on D-Bus User Message Bus Socket.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Reached target Sockets.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Reached target Basic System.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Reached target Default.
Oct 26 13:39:01 vmfsppjb006 systemd[26197]: Startup finished in 44ms.
Oct 26 13:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 13:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Stopped target Default.
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Stopped target Basic System.
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Stopped target Paths.
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Stopped target Timers.
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Stopped target Sockets.
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Closed D-Bus User Message Bus Socket.
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Reached target Shutdown.
Oct 26 13:39:04 vmfsppjb006 systemd[26197]: Starting Exit the Session...
Oct 26 13:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 26325 (systemctl) with signal SIGKILL.
Oct 26 13:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 13:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 13:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 13:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 13:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:39:37 vmfsppjb006 dbus-daemon[26361]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:39:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:39:38 vmfsppjb006 setroubleshoot[26361]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:39:39 vmfsppjb006 setroubleshoot[26361]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:39:39 vmfsppjb006 platform-python[26361]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:40:37 vmfsppjb006 dbus-daemon[26416]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:40:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:40:38 vmfsppjb006 setroubleshoot[26416]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:40:39 vmfsppjb006 setroubleshoot[26416]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:40:39 vmfsppjb006 platform-python[26416]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:42:31 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 13:42:31 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 13:42:31 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 13:42:31 vmfsppjb006 systemd[1]: Started Session 51 of user jobuser.
Oct 26 13:42:31 vmfsppjb006 systemd-logind[931]: New session 51 of user jobuser.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Reached target Paths.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Starting D-Bus User Message Bus Socket.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Reached target Timers.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Listening on D-Bus User Message Bus Socket.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Reached target Sockets.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Reached target Basic System.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Reached target Default.
Oct 26 13:42:31 vmfsppjb006 systemd[26547]: Startup finished in 45ms.
Oct 26 13:42:31 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 13:42:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:42:37 vmfsppjb006 dbus-daemon[26587]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:42:37 vmfsppjb006 powershell[26573]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 13:42:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:42:38 vmfsppjb006 powershell[26573]: (7.1.4:8:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 26573 in AppDomain: None.
Oct 26 13:42:38 vmfsppjb006 setroubleshoot[26587]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:42:39 vmfsppjb006 systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 26599 (.NET ThreadPool)
Oct 26 13:42:39 vmfsppjb006 systemd[1]: Mounting Arbitrary Executable File Formats File System...
Oct 26 13:42:39 vmfsppjb006 systemd[1]: Mounted Arbitrary Executable File Formats File System.
Oct 26 13:42:39 vmfsppjb006 setroubleshoot[26587]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:42:39 vmfsppjb006 powershell[26573]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 13:42:39 vmfsppjb006 platform-python[26587]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:42:42 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 13:42:42 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 13:42:42 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 8c1938c8-1d94-4db3-bb26-4fa0038c899d#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:43 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:56 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 13:42:56 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#0124wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: f713791b-fd84-4b6c-a94b-37689b41b
Oct 26 13:42:56 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 02ca1c13-0ec7-4140-84f6-b318733ad6c9#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 13:42:58 vmfsppjb006 powershell[26573]: (7.1.4:A:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3d28891e-ac7a-4ee8-a2f3-02ff0aad69be#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = dd09dd0f-c345-4303-92de-10833464b800#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 13:42:58 vmfsppjb006 systemd-logind[931]: Session 51 logged out. Waiting for processes to exit.
Oct 26 13:42:58 vmfsppjb006 systemd-logind[931]: Removed session 51.
Oct 26 13:42:58 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 13:42:58 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Stopped target Default.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Stopped target Basic System.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Stopped target Timers.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Stopped target Sockets.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Closed D-Bus User Message Bus Socket.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Stopped target Paths.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Reached target Shutdown.
Oct 26 13:42:58 vmfsppjb006 systemd[26547]: Starting Exit the Session...
Oct 26 13:42:59 vmfsppjb006 systemd[1]: user@1003.service: Killing process 26634 (systemctl) with signal SIGKILL.
Oct 26 13:42:59 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 13:42:59 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 13:42:59 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 13:42:59 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 13:42:59 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 13:42:59 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 13:43:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:43:37 vmfsppjb006 dbus-daemon[26685]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:43:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:43:38 vmfsppjb006 setroubleshoot[26685]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:43:39 vmfsppjb006 setroubleshoot[26685]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:43:39 vmfsppjb006 platform-python[26685]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:45:46 vmfsppjb006 journal[6557]: Job Arranger Server[6557]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000143, jobnet_id: JOBNET_2, user_name: Admin
Oct 26 13:46:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:46:37 vmfsppjb006 dbus-daemon[26870]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:46:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:46:38 vmfsppjb006 setroubleshoot[26870]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:46:39 vmfsppjb006 setroubleshoot[26870]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:46:39 vmfsppjb006 platform-python[26870]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:53:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:53:37 vmfsppjb006 dbus-daemon[27272]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:53:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:53:38 vmfsppjb006 setroubleshoot[27272]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:53:39 vmfsppjb006 setroubleshoot[27272]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:53:39 vmfsppjb006 platform-python[27272]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 13:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 13:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 13:54:01 vmfsppjb006 systemd[1]: Started Session 53 of user omsagent.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Starting D-Bus User Message Bus Socket.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Reached target Paths.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Reached target Timers.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Listening on D-Bus User Message Bus Socket.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Reached target Sockets.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Reached target Basic System.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Reached target Default.
Oct 26 13:54:02 vmfsppjb006 systemd[27317]: Startup finished in 49ms.
Oct 26 13:54:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 13:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:54:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Stopped target Default.
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Stopped target Basic System.
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Stopped target Sockets.
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Closed D-Bus User Message Bus Socket.
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Stopped target Timers.
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Stopped target Paths.
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Reached target Shutdown.
Oct 26 13:54:04 vmfsppjb006 systemd[27317]: Starting Exit the Session...
Oct 26 13:54:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 27436 (systemctl) with signal SIGKILL.
Oct 26 13:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:54:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 13:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 13:54:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 13:54:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 13:54:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 13:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:54:37 vmfsppjb006 dbus-daemon[27474]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:54:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:54:38 vmfsppjb006 setroubleshoot[27474]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:54:39 vmfsppjb006 setroubleshoot[27474]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:54:39 vmfsppjb006 platform-python[27474]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 13:56:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 13:56:37 vmfsppjb006 dbus-daemon[27598]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 13:56:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 13:56:38 vmfsppjb006 setroubleshoot[27598]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 13:56:39 vmfsppjb006 setroubleshoot[27598]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 13:56:39 vmfsppjb006 platform-python[27598]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:06:31 vmfsppjb006 python3.6[1625]: 2021-10-26T05:06:31.527306Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 14:06:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:06:37 vmfsppjb006 dbus-daemon[28176]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:06:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:06:37 vmfsppjb006 setroubleshoot[28176]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:06:38 vmfsppjb006 setroubleshoot[28176]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:06:38 vmfsppjb006 platform-python[28176]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:07:02 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 14:07:02 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 14:07:02 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 14:07:02 vmfsppjb006 systemd[1]: Started Session c10 of user root.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Reached target Paths.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Reached target Timers.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Starting D-Bus User Message Bus Socket.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Reached target Sockets.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Reached target Basic System.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Reached target Default.
Oct 26 14:07:02 vmfsppjb006 systemd[28274]: Startup finished in 50ms.
Oct 26 14:07:02 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Stopped target Default.
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Stopped target Basic System.
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Stopped target Paths.
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Stopped target Sockets.
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Closed D-Bus User Message Bus Socket.
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Reached target Shutdown.
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Starting Exit the Session...
Oct 26 14:07:03 vmfsppjb006 systemd[28274]: Stopped target Timers.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: user@0.service: Killing process 28309 (systemctl) with signal SIGKILL.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 14:07:03 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 14:07:03 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 14:07:13 vmfsppjb006 python3.6[1625]: 2021-10-26T05:07:13.800015Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 10;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 14:07:23 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 14:07:23 vmfsppjb006 journal[6548]: Job Arranger Server[6548]: Got signal [signal:15(SIGTERM),sender_pid:28356,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6557]: Job Arranger Server[6557]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6558]: Job Arranger Server[6558]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6559]: Job Arranger Server[6559]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6560]: Job Arranger Server[6560]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6561]: Job Arranger Server[6561]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6562]: Job Arranger Server[6562]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6563]: Job Arranger Server[6563]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6564]: Job Arranger Server[6564]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6565]: Job Arranger Server[6565]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6566]: Job Arranger Server[6566]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6567]: Job Arranger Server[6567]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:23 vmfsppjb006 journal[6568]: Job Arranger Server[6568]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:07:25 vmfsppjb006 journal[6548]: Job Arranger Server[6548]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 26 14:07:25 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 14:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:07:37 vmfsppjb006 dbus-daemon[28376]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:07:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:07:37 vmfsppjb006 setroubleshoot[28376]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:07:38 vmfsppjb006 setroubleshoot[28376]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:07:38 vmfsppjb006 platform-python[28376]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:08:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:08:37 vmfsppjb006 dbus-daemon[28429]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:08:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:08:37 vmfsppjb006 setroubleshoot[28429]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:08:38 vmfsppjb006 setroubleshoot[28429]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:08:38 vmfsppjb006 platform-python[28429]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 14:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 14:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 14:09:01 vmfsppjb006 systemd[1]: Started Session 56 of user omsagent.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Starting D-Bus User Message Bus Socket.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Reached target Paths.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Reached target Timers.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Reached target Sockets.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Reached target Basic System.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Reached target Default.
Oct 26 14:09:01 vmfsppjb006 systemd[28473]: Startup finished in 46ms.
Oct 26 14:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 14:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Stopped target Default.
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Stopped target Basic System.
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Stopped target Timers.
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Stopped target Paths.
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Stopped target Sockets.
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Closed D-Bus User Message Bus Socket.
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Reached target Shutdown.
Oct 26 14:09:03 vmfsppjb006 systemd[28473]: Starting Exit the Session...
Oct 26 14:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 28591 (systemctl) with signal SIGKILL.
Oct 26 14:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 14:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 14:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 14:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 14:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:09:37 vmfsppjb006 dbus-daemon[28626]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:09:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:09:37 vmfsppjb006 setroubleshoot[28626]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:09:38 vmfsppjb006 setroubleshoot[28626]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:09:38 vmfsppjb006 platform-python[28626]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:11:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:11:37 vmfsppjb006 dbus-daemon[28753]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:11:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:11:37 vmfsppjb006 setroubleshoot[28753]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:11:38 vmfsppjb006 setroubleshoot[28753]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:11:38 vmfsppjb006 platform-python[28753]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:11:56 vmfsppjb006 journal[6551]: Job Arranger Monitor[6551]: [JAMONITOR200002] In ja_sender() jobnet_id 'JOBNET_1' can not be not run on schedule time '202110261410'. calendar_id: CALENDAR_2, schedule_id: SCHEDULE_3, user_name: Admin
Oct 26 14:16:22 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 14:16:23 vmfsppjb006 dnf[29023]: Metadata cache refreshed recently.
Oct 26 14:16:23 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 14:16:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:16:37 vmfsppjb006 dbus-daemon[29050]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:16:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:16:38 vmfsppjb006 setroubleshoot[29050]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:16:38 vmfsppjb006 setroubleshoot[29050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:16:38 vmfsppjb006 platform-python[29050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:20:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:20:37 vmfsppjb006 dbus-daemon[29279]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:20:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:20:38 vmfsppjb006 setroubleshoot[29279]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:20:38 vmfsppjb006 setroubleshoot[29279]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:20:38 vmfsppjb006 platform-python[29279]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 14:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 14:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 14:24:01 vmfsppjb006 systemd[1]: Started Session 58 of user omsagent.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Starting D-Bus User Message Bus Socket.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Reached target Timers.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Reached target Paths.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Reached target Sockets.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Reached target Basic System.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Reached target Default.
Oct 26 14:24:01 vmfsppjb006 systemd[29488]: Startup finished in 49ms.
Oct 26 14:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 14:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Stopped target Default.
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Stopped target Basic System.
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Stopped target Timers.
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Stopped target Sockets.
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Stopped target Paths.
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Closed D-Bus User Message Bus Socket.
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Reached target Shutdown.
Oct 26 14:24:04 vmfsppjb006 systemd[29488]: Starting Exit the Session...
Oct 26 14:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 29607 (systemctl) with signal SIGKILL.
Oct 26 14:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 14:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 14:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 14:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 14:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:24:37 vmfsppjb006 dbus-daemon[29643]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:24:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:24:38 vmfsppjb006 setroubleshoot[29643]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:24:38 vmfsppjb006 setroubleshoot[29643]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:24:38 vmfsppjb006 platform-python[29643]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:26:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:26:37 vmfsppjb006 dbus-daemon[29776]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:26:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:26:38 vmfsppjb006 setroubleshoot[29776]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:26:38 vmfsppjb006 setroubleshoot[29776]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:26:38 vmfsppjb006 platform-python[29776]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:34:55 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 14:34:55 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 14:34:55 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 14:35:10 vmfsppjb006 systemd[1]: Started Session 60 of user finsrvpf.
Oct 26 14:35:10 vmfsppjb006 systemd-logind[931]: New session 60 of user finsrvpf.
Oct 26 14:35:33 vmfsppjb006 su[30334]: (to root) finsrvpf on pts/2
Oct 26 14:35:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:35:37 vmfsppjb006 dbus-daemon[30365]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:35:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:35:38 vmfsppjb006 setroubleshoot[30365]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:35:38 vmfsppjb006 setroubleshoot[30365]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:35:38 vmfsppjb006 platform-python[30365]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:36:38 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 14:36:38 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 14:36:38 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 14:36:38 vmfsppjb006 systemd[1]: Started Session 61 of user jobuser.
Oct 26 14:36:38 vmfsppjb006 systemd-logind[931]: New session 61 of user jobuser.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Starting D-Bus User Message Bus Socket.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Reached target Paths.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Reached target Timers.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Reached target Sockets.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Reached target Basic System.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Reached target Default.
Oct 26 14:36:38 vmfsppjb006 systemd[30447]: Startup finished in 45ms.
Oct 26 14:36:38 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 14:36:38 vmfsppjb006 powershell[30473]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 14:36:38 vmfsppjb006 powershell[30473]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 30473 in AppDomain: None.
Oct 26 14:36:38 vmfsppjb006 powershell[30473]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 2fd075de-425a-4f56-95e0-58f8ca705cda#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:39 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:52 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 14:36:52 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012wTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 46ee7cb0-1c33-4acf-bc84-9fd0d295a13b#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 14:36:52 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: f491083d-5ef6-456c-95c0-7a42d021d228#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 14:36:53 vmfsppjb006 powershell[30473]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 69c7156a-df44-4f27-a109-93682e2fc75b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 6b09e5ad-d2fc-4e8b-a235-bc51ced1f623#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:36:53 vmfsppjb006 systemd-logind[931]: Session 61 logged out. Waiting for processes to exit.
Oct 26 14:36:53 vmfsppjb006 systemd-logind[931]: Removed session 61.
Oct 26 14:36:53 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 14:36:53 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Stopped target Default.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Stopped target Basic System.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Stopped target Timers.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Stopped target Paths.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Stopped target Sockets.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Closed D-Bus User Message Bus Socket.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Reached target Shutdown.
Oct 26 14:36:53 vmfsppjb006 systemd[30447]: Starting Exit the Session...
Oct 26 14:36:53 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 14:36:53 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 14:36:53 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 14:36:53 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 14:36:53 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 14:37:04 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 14:37:04 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 14:37:04 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 14:37:04 vmfsppjb006 systemd[1]: Started Session c11 of user root.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Reached target Timers.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Starting D-Bus User Message Bus Socket.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Reached target Paths.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Reached target Sockets.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Reached target Basic System.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Reached target Default.
Oct 26 14:37:04 vmfsppjb006 systemd[30610]: Startup finished in 52ms.
Oct 26 14:37:04 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 14:37:05 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 14:37:05 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Stopped target Default.
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Stopped target Basic System.
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Stopped target Timers.
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Stopped target Paths.
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Stopped target Sockets.
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Closed D-Bus User Message Bus Socket.
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Reached target Shutdown.
Oct 26 14:37:05 vmfsppjb006 systemd[30610]: Starting Exit the Session...
Oct 26 14:37:05 vmfsppjb006 systemd[1]: user@0.service: Killing process 30648 (systemctl) with signal SIGKILL.
Oct 26 14:37:05 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 14:37:05 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 14:37:05 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 14:37:05 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 14:37:05 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 14:37:05 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 14:37:19 vmfsppjb006 python3.6[1625]: 2021-10-26T05:37:19.106173Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 11;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 14:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:37:37 vmfsppjb006 dbus-daemon[30695]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:37:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:37:38 vmfsppjb006 setroubleshoot[30695]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:37:39 vmfsppjb006 setroubleshoot[30695]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:37:39 vmfsppjb006 platform-python[30695]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:38:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:38:37 vmfsppjb006 dbus-daemon[30762]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:38:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:38:38 vmfsppjb006 setroubleshoot[30762]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:38:38 vmfsppjb006 setroubleshoot[30762]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:38:39 vmfsppjb006 platform-python[30762]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 14:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 14:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 14:39:01 vmfsppjb006 systemd[1]: Started Session 64 of user omsagent.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Reached target Paths.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Starting D-Bus User Message Bus Socket.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Reached target Timers.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Reached target Sockets.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Reached target Basic System.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Reached target Default.
Oct 26 14:39:01 vmfsppjb006 systemd[30794]: Startup finished in 49ms.
Oct 26 14:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Stopped target Default.
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Stopped target Basic System.
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Stopped target Paths.
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Stopped target Sockets.
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Closed D-Bus User Message Bus Socket.
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Reached target Shutdown.
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Starting Exit the Session...
Oct 26 14:39:04 vmfsppjb006 systemd[30794]: Stopped target Timers.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 30914 (systemctl) with signal SIGKILL.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 14:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 14:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 14:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:39:37 vmfsppjb006 dbus-daemon[30950]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:39:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:39:38 vmfsppjb006 setroubleshoot[30950]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:39:39 vmfsppjb006 setroubleshoot[30950]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:39:39 vmfsppjb006 platform-python[30950]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:40:37 vmfsppjb006 dbus-daemon[31017]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:40:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:40:38 vmfsppjb006 setroubleshoot[31017]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:40:39 vmfsppjb006 setroubleshoot[31017]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:40:39 vmfsppjb006 platform-python[31017]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:44:06 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 14:44:08 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 14:44:08 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 14:44:08 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 14:44:08 vmfsppjb006 journal[31241]: Job Arranger Server[31241]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 26 14:44:08 vmfsppjb006 journal[31241]: Job Arranger Server[31241]: [JASERVER000003] server #0 started [main process]
Oct 26 14:44:08 vmfsppjb006 journal[31251]: Job Arranger Server[31251]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 26 14:44:08 vmfsppjb006 journal[31253]: Job Arranger Server[31253]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 26 14:44:08 vmfsppjb006 journal[31252]: Job Arranger Server[31252]: [JASERVER000004] server #11 started [message send #1]
Oct 26 14:44:08 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 14:44:08 vmfsppjb006 journal[31248]: Job Arranger Server[31248]: [JASERVER000004] server #7 started [job trapper #4]
Oct 26 14:44:08 vmfsppjb006 journal[31243]: Job Arranger Server[31243]: [JASERVER000004] server #2 started [start the job #1]
Oct 26 14:44:08 vmfsppjb006 journal[31244]: Job Arranger Server[31244]: [JASERVER000004] server #3 started [check the running job #1]
Oct 26 14:44:08 vmfsppjb006 journal[31245]: Job Arranger Server[31245]: [JASERVER000004] server #4 started [job trapper #1]
Oct 26 14:44:08 vmfsppjb006 journal[31246]: Job Arranger Server[31246]: [JASERVER000004] server #5 started [job trapper #2]
Oct 26 14:44:08 vmfsppjb006 journal[31247]: Job Arranger Server[31247]: [JASERVER000004] server #6 started [job trapper #3]
Oct 26 14:44:08 vmfsppjb006 journal[31250]: Job Arranger Server[31250]: [JASERVER000004] server #9 started [job loader #1]
Oct 26 14:44:08 vmfsppjb006 journal[31242]: Job Arranger Server[31242]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 26 14:44:08 vmfsppjb006 journal[31249]: Job Arranger Server[31249]: [JASERVER000004] server #8 started [job trapper #5]
Oct 26 14:45:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:45:37 vmfsppjb006 dbus-daemon[31346]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:45:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:45:38 vmfsppjb006 setroubleshoot[31346]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:45:39 vmfsppjb006 setroubleshoot[31346]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:45:39 vmfsppjb006 platform-python[31346]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:49:21 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 14:49:21 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 14:49:21 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 14:49:21 vmfsppjb006 systemd[1]: Started Session 66 of user jobuser.
Oct 26 14:49:21 vmfsppjb006 systemd-logind[931]: New session 66 of user jobuser.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Reached target Timers.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Starting D-Bus User Message Bus Socket.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Reached target Paths.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Reached target Sockets.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Reached target Basic System.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Reached target Default.
Oct 26 14:49:21 vmfsppjb006 systemd[31580]: Startup finished in 50ms.
Oct 26 14:49:21 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 14:49:21 vmfsppjb006 powershell[31608]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 14:49:21 vmfsppjb006 powershell[31608]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 31608 in AppDomain: None.
Oct 26 14:49:21 vmfsppjb006 powershell[31608]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 14:49:21 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 14:49:21 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: b3cc832e-1e0b-4ba7-ac43-68c034b4ef3d#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:22 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:34 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 14:49:34 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012gEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62
Oct 26 14:49:34 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 931af81f-b37b-4692-b9c2-5a57e698d102#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 14:49:35 vmfsppjb006 powershell[31608]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 91d5cc86-7dbd-4c33-ba2d-120350474148#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 34022f7e-963b-44e5-9ed2-669e0b258011#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 14:49:35 vmfsppjb006 systemd-logind[931]: Session 66 logged out. Waiting for processes to exit.
Oct 26 14:49:35 vmfsppjb006 systemd-logind[931]: Removed session 66.
Oct 26 14:49:35 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 14:49:35 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Stopped target Default.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Stopped target Basic System.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Stopped target Sockets.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Closed D-Bus User Message Bus Socket.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Stopped target Paths.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Stopped target Timers.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Reached target Shutdown.
Oct 26 14:49:35 vmfsppjb006 systemd[31580]: Starting Exit the Session...
Oct 26 14:49:35 vmfsppjb006 systemd[1]: user@1003.service: Killing process 31645 (systemctl) with signal SIGKILL.
Oct 26 14:49:35 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 14:49:35 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 14:49:35 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 14:49:35 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 14:49:35 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 14:49:35 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 14:49:38 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:49:38 vmfsppjb006 dbus-daemon[31655]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:49:39 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:49:39 vmfsppjb006 setroubleshoot[31655]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:49:40 vmfsppjb006 setroubleshoot[31655]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:49:40 vmfsppjb006 platform-python[31655]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:50:08 vmfsppjb006 journal[31242]: Job Arranger Server[31242]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000145, jobnet_id: JOBNET_2, user_name: Admin
Oct 26 14:50:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:50:37 vmfsppjb006 dbus-daemon[31721]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:50:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:50:38 vmfsppjb006 setroubleshoot[31721]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:50:39 vmfsppjb006 setroubleshoot[31721]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:50:39 vmfsppjb006 platform-python[31721]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:51:00 vmfsppjb006 systemd[1]: Started Session 68 of user finsrvpf.
Oct 26 14:51:00 vmfsppjb006 systemd-logind[931]: New session 68 of user finsrvpf.
Oct 26 14:51:05 vmfsppjb006 su[31776]: (to root) finsrvpf on pts/3
Oct 26 14:51:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:51:37 vmfsppjb006 dbus-daemon[31837]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:51:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:51:38 vmfsppjb006 setroubleshoot[31837]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:51:39 vmfsppjb006 setroubleshoot[31837]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:51:39 vmfsppjb006 platform-python[31837]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:52:04 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 14:52:04 vmfsppjb006 journal[31241]: Job Arranger Server[31241]: Got signal [signal:15(SIGTERM),sender_pid:31877,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31242]: Job Arranger Server[31242]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31243]: Job Arranger Server[31243]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31244]: Job Arranger Server[31244]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31245]: Job Arranger Server[31245]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31246]: Job Arranger Server[31246]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31247]: Job Arranger Server[31247]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31248]: Job Arranger Server[31248]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31249]: Job Arranger Server[31249]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31250]: Job Arranger Server[31250]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31251]: Job Arranger Server[31251]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31252]: Job Arranger Server[31252]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:04 vmfsppjb006 journal[31253]: Job Arranger Server[31253]: Got signal [signal:15(SIGTERM),sender_pid:1,sender_uid:0,reason:0]. Exiting ...
Oct 26 14:52:06 vmfsppjb006 journal[31241]: Job Arranger Server[31241]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 26 14:52:06 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 14:52:06 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 14:52:06 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 14:52:06 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 14:52:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:52:37 vmfsppjb006 dbus-daemon[31923]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:52:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:52:38 vmfsppjb006 setroubleshoot[31923]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:52:39 vmfsppjb006 setroubleshoot[31923]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:52:39 vmfsppjb006 platform-python[31923]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 14:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 14:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 14:54:01 vmfsppjb006 systemd[1]: Started Session 69 of user omsagent.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Reached target Timers.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Reached target Paths.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Starting D-Bus User Message Bus Socket.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Listening on D-Bus User Message Bus Socket.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Reached target Sockets.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Reached target Basic System.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Reached target Default.
Oct 26 14:54:01 vmfsppjb006 systemd[32008]: Startup finished in 47ms.
Oct 26 14:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Stopped target Default.
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Stopped target Basic System.
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Stopped target Paths.
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Stopped target Sockets.
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Closed D-Bus User Message Bus Socket.
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Reached target Shutdown.
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Starting Exit the Session...
Oct 26 14:54:04 vmfsppjb006 systemd[32008]: Stopped target Timers.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 32138 (systemctl) with signal SIGKILL.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 14:54:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 14:54:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 14:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:54:37 vmfsppjb006 dbus-daemon[32174]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:54:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:54:38 vmfsppjb006 setroubleshoot[32174]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:54:39 vmfsppjb006 setroubleshoot[32174]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:54:39 vmfsppjb006 platform-python[32174]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 14:55:37 vmfsppjb006 dbus-daemon[32233]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 14:55:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 14:55:38 vmfsppjb006 setroubleshoot[32233]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 14:55:39 vmfsppjb006 setroubleshoot[32233]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 14:55:39 vmfsppjb006 platform-python[32233]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 14:59:21 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 14:59:23 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 15:01:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:01:37 vmfsppjb006 dbus-daemon[32609]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:01:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:01:38 vmfsppjb006 setroubleshoot[32609]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:01:39 vmfsppjb006 setroubleshoot[32609]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:01:39 vmfsppjb006 platform-python[32609]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:02:18 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 15:02:18 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 15:02:18 vmfsppjb006 journal[32652]: Job Arranger Server[32652]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:02:18 vmfsppjb006 journal[32652]: Job Arranger Server[32652]: [JASERVER000003] server #0 started [main process]
Oct 26 15:02:18 vmfsppjb006 journal[32662]: Job Arranger Server[32662]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 26 15:02:18 vmfsppjb006 journal[32664]: Job Arranger Server[32664]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 26 15:02:18 vmfsppjb006 journal[32663]: Job Arranger Server[32663]: [JASERVER000004] server #11 started [message send #1]
Oct 26 15:02:18 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 15:02:18 vmfsppjb006 journal[32659]: Job Arranger Server[32659]: [JASERVER000004] server #7 started [job trapper #4]
Oct 26 15:02:18 vmfsppjb006 journal[32654]: Job Arranger Server[32654]: [JASERVER000004] server #2 started [start the job #1]
Oct 26 15:02:18 vmfsppjb006 journal[32655]: Job Arranger Server[32655]: [JASERVER000004] server #3 started [check the running job #1]
Oct 26 15:02:18 vmfsppjb006 journal[32656]: Job Arranger Server[32656]: [JASERVER000004] server #4 started [job trapper #1]
Oct 26 15:02:18 vmfsppjb006 journal[32657]: Job Arranger Server[32657]: [JASERVER000004] server #5 started [job trapper #2]
Oct 26 15:02:18 vmfsppjb006 journal[32658]: Job Arranger Server[32658]: [JASERVER000004] server #6 started [job trapper #3]
Oct 26 15:02:18 vmfsppjb006 journal[32661]: Job Arranger Server[32661]: [JASERVER000004] server #9 started [job loader #1]
Oct 26 15:02:18 vmfsppjb006 journal[32653]: Job Arranger Server[32653]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 26 15:02:18 vmfsppjb006 journal[32660]: Job Arranger Server[32660]: [JASERVER000004] server #8 started [job trapper #5]
Oct 26 15:03:22 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 15:03:22 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 15:03:22 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 15:03:22 vmfsppjb006 systemd[1]: Started Session 71 of user jobuser.
Oct 26 15:03:22 vmfsppjb006 systemd-logind[931]: New session 71 of user jobuser.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Reached target Paths.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Starting D-Bus User Message Bus Socket.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Reached target Timers.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Reached target Sockets.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Reached target Basic System.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Reached target Default.
Oct 26 15:03:22 vmfsppjb006 systemd[32728]: Startup finished in 50ms.
Oct 26 15:03:22 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 15:03:22 vmfsppjb006 powershell[32754]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 15:03:22 vmfsppjb006 powershell[32754]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 32754 in AppDomain: None.
Oct 26 15:03:22 vmfsppjb006 powershell[32754]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: a3b43ae8-5757-4140-bcea-ba874f2a1c15#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:23 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:34 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 15:03:34 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012bc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 0088231f-b1d8-479a-9bf7-88a191e437af#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 15:03:34 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: fe9d96ed-2321-4f78-824a-c1a0f0a8e8ac#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 15:03:36 vmfsppjb006 powershell[32754]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = c3c07a1b-a540-4418-a967-8f2e76fa0d14#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 4df6141e-4331-4b6b-81ff-1fc8c3d7c833#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:03:36 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:03:36 vmfsppjb006 dbus-daemon[32793]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:03:36 vmfsppjb006 systemd-logind[931]: Session 71 logged out. Waiting for processes to exit.
Oct 26 15:03:36 vmfsppjb006 systemd-logind[931]: Removed session 71.
Oct 26 15:03:36 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:03:36 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Stopped target Default.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Stopped target Basic System.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Stopped target Sockets.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Closed D-Bus User Message Bus Socket.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Stopped target Timers.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Stopped target Paths.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Reached target Shutdown.
Oct 26 15:03:36 vmfsppjb006 systemd[32728]: Starting Exit the Session...
Oct 26 15:03:37 vmfsppjb006 systemd[1]: user@1003.service: Killing process 32797 (systemctl) with signal SIGKILL.
Oct 26 15:03:37 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:03:37 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 15:03:37 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:03:37 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 15:03:37 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 15:03:37 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 15:03:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:03:37 vmfsppjb006 setroubleshoot[32793]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:03:38 vmfsppjb006 setroubleshoot[32793]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:03:38 vmfsppjb006 platform-python[32793]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:04:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:04:37 vmfsppjb006 dbus-daemon[32872]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:04:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:04:37 vmfsppjb006 setroubleshoot[32872]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:04:38 vmfsppjb006 setroubleshoot[32872]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:04:38 vmfsppjb006 platform-python[32872]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:05:00 vmfsppjb006 journal[32653]: Job Arranger Server[32653]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000146, jobnet_id: JOBNET_2, user_name: Admin
Oct 26 15:05:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:05:37 vmfsppjb006 dbus-daemon[32939]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:05:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:05:37 vmfsppjb006 setroubleshoot[32939]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:05:38 vmfsppjb006 setroubleshoot[32939]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:05:38 vmfsppjb006 platform-python[32939]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:06:37 vmfsppjb006 python3.6[1625]: 2021-10-26T06:06:37.463352Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 15:07:06 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 15:07:06 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 15:07:06 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 15:07:06 vmfsppjb006 systemd[1]: Started Session c12 of user root.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Reached target Paths.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Starting D-Bus User Message Bus Socket.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Reached target Timers.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Reached target Sockets.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Reached target Basic System.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Reached target Default.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Startup finished in 48ms.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Stopped target Default.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Stopped target Basic System.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Stopped target Sockets.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Stopped target Paths.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Stopped target Timers.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Closed D-Bus User Message Bus Socket.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Reached target Shutdown.
Oct 26 15:07:07 vmfsppjb006 systemd[33104]: Starting Exit the Session...
Oct 26 15:07:07 vmfsppjb006 systemd[1]: user@0.service: Killing process 33138 (systemctl) with signal SIGKILL.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 15:07:07 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 15:07:07 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 15:07:19 vmfsppjb006 python3.6[1625]: 2021-10-26T06:07:19.662143Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 12;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 15:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:07:37 vmfsppjb006 dbus-daemon[33182]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:07:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:07:37 vmfsppjb006 setroubleshoot[33182]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:07:38 vmfsppjb006 setroubleshoot[33182]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:07:38 vmfsppjb006 platform-python[33182]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:08:31 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 15:08:31 vmfsppjb006 journal[32652]: Job Arranger Server[32652]: Got signal [signal:15(SIGTERM),sender_pid:33243,sender_uid:0,reason:0]. Exiting ...
Oct 26 15:08:33 vmfsppjb006 journal[32652]: Job Arranger Server[32652]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:08:33 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 15:08:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:08:37 vmfsppjb006 dbus-daemon[33252]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:08:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:08:37 vmfsppjb006 setroubleshoot[33252]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:08:38 vmfsppjb006 setroubleshoot[33252]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:08:38 vmfsppjb006 platform-python[33252]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 15:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 15:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 15:09:01 vmfsppjb006 systemd[1]: Started Session 74 of user omsagent.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Reached target Paths.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Starting D-Bus User Message Bus Socket.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Reached target Timers.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Reached target Sockets.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Reached target Basic System.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Reached target Default.
Oct 26 15:09:01 vmfsppjb006 systemd[33297]: Startup finished in 47ms.
Oct 26 15:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 15:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Stopped target Default.
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Stopped target Basic System.
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Stopped target Paths.
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Stopped target Timers.
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Stopped target Sockets.
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Closed D-Bus User Message Bus Socket.
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Reached target Shutdown.
Oct 26 15:09:04 vmfsppjb006 systemd[33297]: Starting Exit the Session...
Oct 26 15:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 33418 (systemctl) with signal SIGKILL.
Oct 26 15:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 15:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 15:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 15:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 15:09:25 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 15:09:25 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 15:09:25 vmfsppjb006 journal[33443]: Job Arranger Server[33443]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:09:25 vmfsppjb006 journal[33443]: Job Arranger Server[33443]: [JASERVER000003] server #0 started [main process]
Oct 26 15:09:25 vmfsppjb006 journal[33453]: Job Arranger Server[33453]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 26 15:09:25 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 15:09:25 vmfsppjb006 journal[33455]: Job Arranger Server[33455]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 26 15:09:25 vmfsppjb006 journal[33454]: Job Arranger Server[33454]: [JASERVER000004] server #11 started [message send #1]
Oct 26 15:09:25 vmfsppjb006 journal[33450]: Job Arranger Server[33450]: [JASERVER000004] server #7 started [job trapper #4]
Oct 26 15:09:25 vmfsppjb006 journal[33445]: Job Arranger Server[33445]: [JASERVER000004] server #2 started [start the job #1]
Oct 26 15:09:25 vmfsppjb006 journal[33446]: Job Arranger Server[33446]: [JASERVER000004] server #3 started [check the running job #1]
Oct 26 15:09:25 vmfsppjb006 journal[33447]: Job Arranger Server[33447]: [JASERVER000004] server #4 started [job trapper #1]
Oct 26 15:09:25 vmfsppjb006 journal[33448]: Job Arranger Server[33448]: [JASERVER000004] server #5 started [job trapper #2]
Oct 26 15:09:26 vmfsppjb006 journal[33449]: Job Arranger Server[33449]: [JASERVER000004] server #6 started [job trapper #3]
Oct 26 15:09:26 vmfsppjb006 journal[33452]: Job Arranger Server[33452]: [JASERVER000004] server #9 started [job loader #1]
Oct 26 15:09:26 vmfsppjb006 journal[33444]: Job Arranger Server[33444]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 26 15:09:26 vmfsppjb006 journal[33451]: Job Arranger Server[33451]: [JASERVER000004] server #8 started [job trapper #5]
Oct 26 15:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:09:37 vmfsppjb006 dbus-daemon[33471]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:09:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:09:37 vmfsppjb006 setroubleshoot[33471]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:09:38 vmfsppjb006 setroubleshoot[33471]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:09:38 vmfsppjb006 platform-python[33471]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:10:25 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 15:10:25 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 15:10:25 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 15:10:25 vmfsppjb006 systemd[1]: Started Session 76 of user jobuser.
Oct 26 15:10:25 vmfsppjb006 systemd-logind[931]: New session 76 of user jobuser.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Starting D-Bus User Message Bus Socket.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Reached target Paths.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Reached target Timers.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Reached target Sockets.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Reached target Basic System.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Reached target Default.
Oct 26 15:10:25 vmfsppjb006 systemd[33529]: Startup finished in 45ms.
Oct 26 15:10:25 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 15:10:25 vmfsppjb006 powershell[33555]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 15:10:25 vmfsppjb006 powershell[33555]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 33555 in AppDomain: None.
Oct 26 15:10:25 vmfsppjb006 powershell[33555]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: b9e53e5d-9f97-44bf-b31c-b4d006dad919#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:26 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:10:37 vmfsppjb006 dbus-daemon[33594]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:10:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:10:38 vmfsppjb006 setroubleshoot[33594]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:10:38 vmfsppjb006 setroubleshoot[33594]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:10:38 vmfsppjb006 platform-python[33594]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:10:38 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 15:10:38 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 58535e4f-29d8-4856-a5be-e42abd00ec1c#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 15:10:38 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 8eb988c8-1310-491d-84ae-3e022dae5d3a#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 15:10:40 vmfsppjb006 powershell[33555]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ebbd1808-0b0b-412b-9bf5-cf7c1cf3dd45#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 9c6e50f4-7223-4500-91df-54ba6705618b#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:10:40 vmfsppjb006 systemd-logind[931]: Session 76 logged out. Waiting for processes to exit.
Oct 26 15:10:40 vmfsppjb006 systemd-logind[931]: Removed session 76.
Oct 26 15:10:40 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:10:40 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Stopped target Default.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Stopped target Basic System.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Stopped target Timers.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Stopped target Sockets.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Closed D-Bus User Message Bus Socket.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Stopped target Paths.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Reached target Shutdown.
Oct 26 15:10:40 vmfsppjb006 systemd[33529]: Starting Exit the Session...
Oct 26 15:10:40 vmfsppjb006 systemd[1]: user@1003.service: Killing process 33603 (systemctl) with signal SIGKILL.
Oct 26 15:10:40 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:10:40 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 15:10:40 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:10:40 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 15:10:40 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 15:10:40 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 15:11:09 vmfsppjb006 journal[33444]: Job Arranger Server[33444]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000147, jobnet_id: JOBNET_2, user_name: Admin
Oct 26 15:11:09 vmfsppjb006 rsyslogd[1627]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 26 15:11:27 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 15:11:27 vmfsppjb006 journal[33443]: Job Arranger Server[33443]: Got signal [signal:15(SIGTERM),sender_pid:33654,sender_uid:0,reason:0]. Exiting ...
Oct 26 15:11:29 vmfsppjb006 journal[33443]: Job Arranger Server[33443]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:11:29 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 15:11:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:11:37 vmfsppjb006 dbus-daemon[33669]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:11:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:11:37 vmfsppjb006 setroubleshoot[33669]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:11:38 vmfsppjb006 setroubleshoot[33669]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:11:38 vmfsppjb006 platform-python[33669]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:12:36 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 15:12:36 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 15:12:36 vmfsppjb006 journal[33736]: Job Arranger Server[33736]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:12:36 vmfsppjb006 journal[33736]: Job Arranger Server[33736]: [JASERVER000003] server #0 started [main process]
Oct 26 15:12:36 vmfsppjb006 journal[33747]: Job Arranger Server[33747]: [JASERVER000004] server #11 started [message send #1]
Oct 26 15:12:36 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 15:12:36 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:12:36 vmfsppjb006 journal[33748]: Job Arranger Server[33748]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 26 15:12:36 vmfsppjb006 journal[33744]: Job Arranger Server[33744]: [JASERVER000004] server #8 started [job trapper #5]
Oct 26 15:12:36 vmfsppjb006 journal[33739]: Job Arranger Server[33739]: [JASERVER000004] server #3 started [check the running job #1]
Oct 26 15:12:36 vmfsppjb006 journal[33740]: Job Arranger Server[33740]: [JASERVER000004] server #4 started [job trapper #1]
Oct 26 15:12:36 vmfsppjb006 journal[33737]: Job Arranger Server[33737]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 26 15:12:36 vmfsppjb006 journal[33741]: Job Arranger Server[33741]: [JASERVER000004] server #5 started [job trapper #2]
Oct 26 15:12:36 vmfsppjb006 journal[33742]: Job Arranger Server[33742]: [JASERVER000004] server #6 started [job trapper #3]
Oct 26 15:12:36 vmfsppjb006 journal[33743]: Job Arranger Server[33743]: [JASERVER000004] server #7 started [job trapper #4]
Oct 26 15:12:36 vmfsppjb006 journal[33746]: Job Arranger Server[33746]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 26 15:12:36 vmfsppjb006 journal[33738]: Job Arranger Server[33738]: [JASERVER000004] server #2 started [start the job #1]
Oct 26 15:12:36 vmfsppjb006 journal[33745]: Job Arranger Server[33745]: [JASERVER000004] server #9 started [job loader #1]
Oct 26 15:12:36 vmfsppjb006 dbus-daemon[33750]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:12:36 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:12:37 vmfsppjb006 setroubleshoot[33750]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:12:37 vmfsppjb006 setroubleshoot[33750]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:12:37 vmfsppjb006 platform-python[33750]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:16:25 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 15:16:27 vmfsppjb006 dnf[33966]: packages-microsoft-com-prod                      12 kB/s | 3.0 kB     00:00
Oct 26 15:16:27 vmfsppjb006 dnf[33966]: MySQL 8.0 Community Server                      233 kB/s | 2.6 kB     00:00
Oct 26 15:16:27 vmfsppjb006 dnf[33966]: MySQL Connectors Community                      130 kB/s | 2.6 kB     00:00
Oct 26 15:16:27 vmfsppjb006 dnf[33966]: MySQL Tools Community                           150 kB/s | 2.6 kB     00:00
Oct 26 15:16:27 vmfsppjb006 dnf[33966]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.1 kB/s | 2.4 kB     00:00
Oct 26 15:16:28 vmfsppjb006 dnf[33966]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.6 kB/s | 2.8 kB     00:00
Oct 26 15:16:29 vmfsppjb006 dnf[33966]: Microsoft Azure RPMs for RHEL8 Extended Update  6.8 kB/s | 2.1 kB     00:00
Oct 26 15:16:29 vmfsppjb006 dnf[33966]: Zabbix Official Repository - x86_64              13 kB/s | 2.9 kB     00:00
Oct 26 15:16:29 vmfsppjb006 dnf[33966]: Zabbix Official Repository non-supported - x86_  12 kB/s | 3.0 kB     00:00
Oct 26 15:16:30 vmfsppjb006 dnf[33966]: Metadata cache created.
Oct 26 15:16:30 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 15:16:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:16:37 vmfsppjb006 dbus-daemon[34000]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:16:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:16:38 vmfsppjb006 setroubleshoot[34000]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:16:38 vmfsppjb006 setroubleshoot[34000]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:16:38 vmfsppjb006 platform-python[34000]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:21:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:21:37 vmfsppjb006 dbus-daemon[34290]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:21:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:21:38 vmfsppjb006 setroubleshoot[34290]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:21:38 vmfsppjb006 setroubleshoot[34290]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:21:38 vmfsppjb006 platform-python[34290]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 15:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 15:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 15:24:01 vmfsppjb006 systemd[1]: Started Session 78 of user omsagent.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Starting D-Bus User Message Bus Socket.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Reached target Paths.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Reached target Timers.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Reached target Sockets.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Reached target Basic System.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Reached target Default.
Oct 26 15:24:01 vmfsppjb006 systemd[34429]: Startup finished in 47ms.
Oct 26 15:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 15:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Stopped target Default.
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Stopped target Basic System.
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Stopped target Sockets.
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Stopped target Paths.
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Stopped target Timers.
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Closed D-Bus User Message Bus Socket.
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Reached target Shutdown.
Oct 26 15:24:03 vmfsppjb006 systemd[34429]: Starting Exit the Session...
Oct 26 15:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 34548 (systemctl) with signal SIGKILL.
Oct 26 15:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 15:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 15:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 15:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 15:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:24:37 vmfsppjb006 dbus-daemon[34587]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:24:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:24:38 vmfsppjb006 setroubleshoot[34587]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:24:38 vmfsppjb006 setroubleshoot[34587]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:24:38 vmfsppjb006 platform-python[34587]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:26:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:26:37 vmfsppjb006 dbus-daemon[34714]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:26:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:26:38 vmfsppjb006 setroubleshoot[34714]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:26:38 vmfsppjb006 setroubleshoot[34714]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:26:38 vmfsppjb006 platform-python[34714]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:33:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:33:37 vmfsppjb006 dbus-daemon[35133]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:33:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:33:38 vmfsppjb006 setroubleshoot[35133]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:33:38 vmfsppjb006 setroubleshoot[35133]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:33:38 vmfsppjb006 platform-python[35133]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:37:08 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 15:37:08 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 15:37:08 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 15:37:08 vmfsppjb006 systemd[1]: Started Session c13 of user root.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Reached target Timers.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Starting D-Bus User Message Bus Socket.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Reached target Paths.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Reached target Sockets.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Reached target Basic System.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Reached target Default.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Startup finished in 45ms.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Stopped target Default.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Stopped target Basic System.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Stopped target Timers.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Stopped target Paths.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Stopped target Sockets.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Closed D-Bus User Message Bus Socket.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Reached target Shutdown.
Oct 26 15:37:09 vmfsppjb006 systemd[35414]: Starting Exit the Session...
Oct 26 15:37:09 vmfsppjb006 systemd[1]: user@0.service: Killing process 35449 (systemctl) with signal SIGKILL.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 15:37:09 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 15:37:09 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 15:37:22 vmfsppjb006 python3.6[1625]: 2021-10-26T06:37:22.814460Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 13;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 15:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:37:37 vmfsppjb006 dbus-daemon[35497]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:37:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:37:38 vmfsppjb006 setroubleshoot[35497]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:37:38 vmfsppjb006 setroubleshoot[35497]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:37:38 vmfsppjb006 platform-python[35497]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 15:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 15:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 15:39:01 vmfsppjb006 systemd[1]: Started Session 81 of user omsagent.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Starting D-Bus User Message Bus Socket.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Reached target Paths.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Reached target Timers.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Reached target Sockets.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Reached target Basic System.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Reached target Default.
Oct 26 15:39:01 vmfsppjb006 systemd[35583]: Startup finished in 47ms.
Oct 26 15:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Stopped target Default.
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Stopped target Basic System.
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Stopped target Sockets.
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Closed D-Bus User Message Bus Socket.
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Stopped target Paths.
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Reached target Shutdown.
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Starting Exit the Session...
Oct 26 15:39:05 vmfsppjb006 systemd[35583]: Stopped target Timers.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: user@986.service: Killing process 35703 (systemctl) with signal SIGKILL.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 15:39:05 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 15:39:05 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 15:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:39:37 vmfsppjb006 dbus-daemon[35737]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:39:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:39:38 vmfsppjb006 setroubleshoot[35737]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:39:39 vmfsppjb006 setroubleshoot[35737]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:39:39 vmfsppjb006 platform-python[35737]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:39:43 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 15:39:43 vmfsppjb006 journal[33736]: Job Arranger Server[33736]: Got signal [signal:15(SIGTERM),sender_pid:35757,sender_uid:0,reason:0]. Exiting ...
Oct 26 15:39:45 vmfsppjb006 journal[33736]: Job Arranger Server[33736]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:39:45 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 15:39:45 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 15:39:45 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 15:39:45 vmfsppjb006 journal[35764]: Job Arranger Server[35764]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:39:45 vmfsppjb006 journal[35764]: Job Arranger Server[35764]: [JASERVER000003] server #0 started [main process]
Oct 26 15:39:45 vmfsppjb006 journal[35765]: Job Arranger Server[35765]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 26 15:39:45 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 15:39:45 vmfsppjb006 journal[35766]: Job Arranger Server[35766]: [JASERVER000004] server #2 started [start the job #1]
Oct 26 15:39:45 vmfsppjb006 journal[35767]: Job Arranger Server[35767]: [JASERVER000004] server #3 started [check the running job #1]
Oct 26 15:39:45 vmfsppjb006 journal[35768]: Job Arranger Server[35768]: [JASERVER000004] server #4 started [job trapper #1]
Oct 26 15:39:45 vmfsppjb006 journal[35769]: Job Arranger Server[35769]: [JASERVER000004] server #5 started [job trapper #2]
Oct 26 15:39:45 vmfsppjb006 journal[35770]: Job Arranger Server[35770]: [JASERVER000004] server #6 started [job trapper #3]
Oct 26 15:39:45 vmfsppjb006 journal[35771]: Job Arranger Server[35771]: [JASERVER000004] server #7 started [job trapper #4]
Oct 26 15:39:45 vmfsppjb006 journal[35772]: Job Arranger Server[35772]: [JASERVER000004] server #8 started [job trapper #5]
Oct 26 15:39:45 vmfsppjb006 journal[35773]: Job Arranger Server[35773]: [JASERVER000004] server #9 started [job loader #1]
Oct 26 15:39:45 vmfsppjb006 journal[35774]: Job Arranger Server[35774]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 26 15:39:45 vmfsppjb006 journal[35775]: Job Arranger Server[35775]: [JASERVER000004] server #11 started [message send #1]
Oct 26 15:39:45 vmfsppjb006 journal[35776]: Job Arranger Server[35776]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 26 15:40:10 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 15:40:10 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 15:40:10 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 15:40:10 vmfsppjb006 systemd[1]: Started Session 83 of user jobuser.
Oct 26 15:40:10 vmfsppjb006 systemd-logind[931]: New session 83 of user jobuser.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Starting D-Bus User Message Bus Socket.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Reached target Paths.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Reached target Timers.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Reached target Sockets.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Reached target Basic System.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Reached target Default.
Oct 26 15:40:10 vmfsppjb006 systemd[35805]: Startup finished in 51ms.
Oct 26 15:40:10 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 15:40:10 vmfsppjb006 powershell[35832]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 15:40:10 vmfsppjb006 powershell[35832]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 35832 in AppDomain: None.
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 7b1d8588-f084-47ac-93e2-03cdaf6da4d2#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:11 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:24 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 15:40:24 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012FpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 6dbe6770-b3e9-41ba-9afd-242828113719#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 15:40:24 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 00c4c302-15f1-4232-8667-4bd97aaa2e3f#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 15:40:25 vmfsppjb006 powershell[35832]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 249f9014-d71b-4086-bba9-1b49649726e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 55855b08-9088-4941-9bf0-94b8f5fbc55a#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 15:40:25 vmfsppjb006 systemd-logind[931]: Session 83 logged out. Waiting for processes to exit.
Oct 26 15:40:25 vmfsppjb006 systemd-logind[931]: Removed session 83.
Oct 26 15:40:25 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:40:25 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Stopped target Default.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Stopped target Basic System.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Stopped target Paths.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Stopped target Timers.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Stopped target Sockets.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Closed D-Bus User Message Bus Socket.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Reached target Shutdown.
Oct 26 15:40:25 vmfsppjb006 systemd[35805]: Starting Exit the Session...
Oct 26 15:40:25 vmfsppjb006 systemd[1]: user@1003.service: Killing process 35868 (systemctl) with signal SIGKILL.
Oct 26 15:40:25 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:40:25 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 15:40:25 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 15:40:25 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 15:40:25 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 15:40:25 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 15:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:40:37 vmfsppjb006 dbus-daemon[35890]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:40:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:40:38 vmfsppjb006 setroubleshoot[35890]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:40:39 vmfsppjb006 setroubleshoot[35890]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:40:39 vmfsppjb006 platform-python[35890]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:40:53 vmfsppjb006 journal[35765]: Job Arranger Server[35765]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000148, jobnet_id: JOBNET_2, user_name: Admin
Oct 26 15:41:32 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 26 15:41:32 vmfsppjb006 journal[35764]: Job Arranger Server[35764]: Got signal [signal:15(SIGTERM),sender_pid:35948,sender_uid:0,reason:0]. Exiting ...
Oct 26 15:41:34 vmfsppjb006 journal[35764]: Job Arranger Server[35764]: [JASERVER000002] Job Arranger Server stopped. Job Arranger 5.0.1 (revision 7557).
Oct 26 15:41:34 vmfsppjb006 systemd[1]: Stopped Jobarranger Server.
Oct 26 15:41:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:41:37 vmfsppjb006 dbus-daemon[35966]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:41:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:41:38 vmfsppjb006 setroubleshoot[35966]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:41:39 vmfsppjb006 setroubleshoot[35966]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:41:39 vmfsppjb006 platform-python[35966]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 15:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 15:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 15:54:01 vmfsppjb006 systemd[1]: Started Session 85 of user omsagent.
Oct 26 15:54:01 vmfsppjb006 systemd[36683]: Reached target Paths.
Oct 26 15:54:02 vmfsppjb006 systemd[36683]: Starting D-Bus User Message Bus Socket.
Oct 26 15:54:02 vmfsppjb006 systemd[36683]: Reached target Timers.
Oct 26 15:54:02 vmfsppjb006 systemd[36683]: Listening on D-Bus User Message Bus Socket.
Oct 26 15:54:02 vmfsppjb006 systemd[36683]: Reached target Sockets.
Oct 26 15:54:02 vmfsppjb006 systemd[36683]: Reached target Basic System.
Oct 26 15:54:02 vmfsppjb006 systemd[36683]: Reached target Default.
Oct 26 15:54:02 vmfsppjb006 systemd[36683]: Startup finished in 57ms.
Oct 26 15:54:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 15:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:54:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Stopped target Default.
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Stopped target Basic System.
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Stopped target Paths.
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Stopped target Timers.
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Stopped target Sockets.
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Closed D-Bus User Message Bus Socket.
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Reached target Shutdown.
Oct 26 15:54:04 vmfsppjb006 systemd[36683]: Starting Exit the Session...
Oct 26 15:54:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 36803 (systemctl) with signal SIGKILL.
Oct 26 15:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:54:05 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 15:54:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 15:54:05 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 15:54:05 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 15:54:05 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 15:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:54:37 vmfsppjb006 dbus-daemon[36841]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:54:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:54:38 vmfsppjb006 setroubleshoot[36841]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:54:39 vmfsppjb006 setroubleshoot[36841]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:54:39 vmfsppjb006 platform-python[36841]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 15:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 15:55:37 vmfsppjb006 dbus-daemon[36911]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 15:55:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 15:55:38 vmfsppjb006 setroubleshoot[36911]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 15:55:39 vmfsppjb006 setroubleshoot[36911]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 15:55:39 vmfsppjb006 platform-python[36911]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:00:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:00:37 vmfsppjb006 dbus-daemon[37205]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:00:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:00:38 vmfsppjb006 setroubleshoot[37205]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:00:39 vmfsppjb006 setroubleshoot[37205]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:00:39 vmfsppjb006 platform-python[37205]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:06:40 vmfsppjb006 python3.6[1625]: 2021-10-26T07:06:40.947727Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 16:07:10 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 16:07:10 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 16:07:10 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 16:07:10 vmfsppjb006 systemd[1]: Started Session c14 of user root.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Starting D-Bus User Message Bus Socket.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Reached target Timers.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Reached target Paths.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Listening on D-Bus User Message Bus Socket.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Reached target Sockets.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Reached target Basic System.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Reached target Default.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Startup finished in 49ms.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Stopped target Default.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Stopped target Basic System.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Stopped target Paths.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Stopped target Timers.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Stopped target Sockets.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Closed D-Bus User Message Bus Socket.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Reached target Shutdown.
Oct 26 16:07:11 vmfsppjb006 systemd[37662]: Starting Exit the Session...
Oct 26 16:07:11 vmfsppjb006 systemd[1]: user@0.service: Killing process 37697 (systemctl) with signal SIGKILL.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 16:07:11 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 16:07:11 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 16:07:23 vmfsppjb006 python3.6[1625]: 2021-10-26T07:07:23.117779Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 14;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 16:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:07:37 vmfsppjb006 dbus-daemon[37740]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:07:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:07:37 vmfsppjb006 setroubleshoot[37740]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:07:38 vmfsppjb006 setroubleshoot[37740]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:07:38 vmfsppjb006 platform-python[37740]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 16:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 16:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 16:09:01 vmfsppjb006 systemd[1]: Started Session 88 of user omsagent.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Reached target Paths.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Reached target Timers.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Starting D-Bus User Message Bus Socket.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Listening on D-Bus User Message Bus Socket.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Reached target Sockets.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Reached target Basic System.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Reached target Default.
Oct 26 16:09:01 vmfsppjb006 systemd[37826]: Startup finished in 48ms.
Oct 26 16:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 16:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Stopped target Default.
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Stopped target Basic System.
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Stopped target Timers.
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Stopped target Paths.
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Stopped target Sockets.
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Closed D-Bus User Message Bus Socket.
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Reached target Shutdown.
Oct 26 16:09:03 vmfsppjb006 systemd[37826]: Starting Exit the Session...
Oct 26 16:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 37944 (systemctl) with signal SIGKILL.
Oct 26 16:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 16:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 16:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 16:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 16:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:09:37 vmfsppjb006 dbus-daemon[37992]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:09:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:09:37 vmfsppjb006 setroubleshoot[37992]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:09:38 vmfsppjb006 setroubleshoot[37992]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:09:38 vmfsppjb006 platform-python[37992]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:10:37 vmfsppjb006 dbus-daemon[38047]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:10:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:10:37 vmfsppjb006 setroubleshoot[38047]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:10:38 vmfsppjb006 setroubleshoot[38047]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:10:38 vmfsppjb006 platform-python[38047]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:16:36 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 16:16:36 vmfsppjb006 dnf[38395]: Metadata cache refreshed recently.
Oct 26 16:16:36 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 16:17:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:17:37 vmfsppjb006 dbus-daemon[38452]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:17:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:17:38 vmfsppjb006 setroubleshoot[38452]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:17:38 vmfsppjb006 setroubleshoot[38452]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:17:38 vmfsppjb006 platform-python[38452]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 16:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 16:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 16:24:01 vmfsppjb006 systemd[1]: Started Session 90 of user omsagent.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Starting D-Bus User Message Bus Socket.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Reached target Timers.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Reached target Paths.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Listening on D-Bus User Message Bus Socket.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Reached target Sockets.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Reached target Basic System.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Reached target Default.
Oct 26 16:24:02 vmfsppjb006 systemd[38822]: Startup finished in 47ms.
Oct 26 16:24:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Stopped target Default.
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Stopped target Basic System.
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Stopped target Paths.
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Stopped target Sockets.
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Closed D-Bus User Message Bus Socket.
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Reached target Shutdown.
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Starting Exit the Session...
Oct 26 16:24:04 vmfsppjb006 systemd[38822]: Stopped target Timers.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 38940 (systemctl) with signal SIGKILL.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 16:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 16:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 16:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:24:37 vmfsppjb006 dbus-daemon[38979]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:24:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:24:38 vmfsppjb006 setroubleshoot[38979]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:24:38 vmfsppjb006 setroubleshoot[38979]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:24:38 vmfsppjb006 platform-python[38979]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:25:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:25:37 vmfsppjb006 dbus-daemon[39046]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:25:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:25:38 vmfsppjb006 setroubleshoot[39046]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:25:38 vmfsppjb006 setroubleshoot[39046]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:25:38 vmfsppjb006 platform-python[39046]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:30:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:30:37 vmfsppjb006 dbus-daemon[39337]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:30:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:30:38 vmfsppjb006 setroubleshoot[39337]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:30:38 vmfsppjb006 setroubleshoot[39337]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:30:38 vmfsppjb006 platform-python[39337]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:37:12 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 16:37:12 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 16:37:12 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 16:37:12 vmfsppjb006 systemd[1]: Started Session c15 of user root.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Starting D-Bus User Message Bus Socket.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Reached target Timers.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Reached target Paths.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Listening on D-Bus User Message Bus Socket.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Reached target Sockets.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Reached target Basic System.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Reached target Default.
Oct 26 16:37:12 vmfsppjb006 systemd[39789]: Startup finished in 48ms.
Oct 26 16:37:12 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 16:37:13 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 16:37:13 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Stopped target Default.
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Stopped target Basic System.
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Stopped target Timers.
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Stopped target Sockets.
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Closed D-Bus User Message Bus Socket.
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Stopped target Paths.
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Reached target Shutdown.
Oct 26 16:37:13 vmfsppjb006 systemd[39789]: Starting Exit the Session...
Oct 26 16:37:13 vmfsppjb006 systemd[1]: user@0.service: Killing process 39823 (systemctl) with signal SIGKILL.
Oct 26 16:37:13 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 16:37:13 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 16:37:13 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 16:37:13 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 16:37:13 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 16:37:13 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 16:37:27 vmfsppjb006 python3.6[1625]: 2021-10-26T07:37:27.329876Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 15;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 16:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:37:37 vmfsppjb006 dbus-daemon[39856]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:37:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:37:38 vmfsppjb006 setroubleshoot[39856]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:37:38 vmfsppjb006 setroubleshoot[39856]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:37:38 vmfsppjb006 platform-python[39856]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 16:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 16:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 16:39:01 vmfsppjb006 systemd[1]: Started Session 93 of user omsagent.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Reached target Paths.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Starting D-Bus User Message Bus Socket.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Reached target Timers.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Listening on D-Bus User Message Bus Socket.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Reached target Sockets.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Reached target Basic System.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Reached target Default.
Oct 26 16:39:01 vmfsppjb006 systemd[39953]: Startup finished in 46ms.
Oct 26 16:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 16:39:35 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:39:35 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Stopped target Default.
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Stopped target Basic System.
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Stopped target Sockets.
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Closed D-Bus User Message Bus Socket.
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Stopped target Timers.
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Stopped target Paths.
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Reached target Shutdown.
Oct 26 16:39:35 vmfsppjb006 systemd[39953]: Starting Exit the Session...
Oct 26 16:39:35 vmfsppjb006 systemd[1]: user@986.service: Killing process 40096 (systemctl) with signal SIGKILL.
Oct 26 16:39:35 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:39:35 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 16:39:35 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:39:35 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 16:39:35 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 16:39:35 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 16:39:38 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:39:38 vmfsppjb006 dbus-daemon[40107]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:39:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:39:38 vmfsppjb006 setroubleshoot[40107]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:39:39 vmfsppjb006 setroubleshoot[40107]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:39:39 vmfsppjb006 platform-python[40107]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:40:37 vmfsppjb006 dbus-daemon[40172]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:40:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:40:38 vmfsppjb006 setroubleshoot[40172]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:40:38 vmfsppjb006 setroubleshoot[40172]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:40:38 vmfsppjb006 platform-python[40172]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 16:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 16:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 16:54:01 vmfsppjb006 systemd[1]: Started Session 95 of user omsagent.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Reached target Paths.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Starting D-Bus User Message Bus Socket.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Reached target Timers.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Listening on D-Bus User Message Bus Socket.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Reached target Sockets.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Reached target Basic System.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Reached target Default.
Oct 26 16:54:01 vmfsppjb006 systemd[40917]: Startup finished in 45ms.
Oct 26 16:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 16:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Stopped target Default.
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Stopped target Basic System.
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Stopped target Timers.
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Stopped target Sockets.
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Closed D-Bus User Message Bus Socket.
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Stopped target Paths.
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Reached target Shutdown.
Oct 26 16:54:03 vmfsppjb006 systemd[40917]: Starting Exit the Session...
Oct 26 16:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 41036 (systemctl) with signal SIGKILL.
Oct 26 16:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 16:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 16:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 16:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 16:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 16:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:54:37 vmfsppjb006 dbus-daemon[41079]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:54:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:54:38 vmfsppjb006 setroubleshoot[41079]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:54:39 vmfsppjb006 setroubleshoot[41079]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:54:39 vmfsppjb006 platform-python[41079]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 16:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 16:55:37 vmfsppjb006 dbus-daemon[41142]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 16:55:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 16:55:38 vmfsppjb006 setroubleshoot[41142]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 16:55:39 vmfsppjb006 setroubleshoot[41142]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 16:55:39 vmfsppjb006 platform-python[41142]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:01:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:01:37 vmfsppjb006 dbus-daemon[41506]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:01:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:01:38 vmfsppjb006 setroubleshoot[41506]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:01:39 vmfsppjb006 setroubleshoot[41506]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:01:39 vmfsppjb006 platform-python[41506]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:06:45 vmfsppjb006 python3.6[1625]: 2021-10-26T08:06:45.058236Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 17:07:14 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 17:07:14 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 17:07:14 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 17:07:14 vmfsppjb006 systemd[1]: Started Session c16 of user root.
Oct 26 17:07:14 vmfsppjb006 systemd[41896]: Reached target Timers.
Oct 26 17:07:14 vmfsppjb006 systemd[41896]: Starting D-Bus User Message Bus Socket.
Oct 26 17:07:14 vmfsppjb006 systemd[41896]: Reached target Paths.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Listening on D-Bus User Message Bus Socket.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Reached target Sockets.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Reached target Basic System.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Reached target Default.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Startup finished in 49ms.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Stopped target Default.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Stopped target Basic System.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Stopped target Sockets.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Closed D-Bus User Message Bus Socket.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Stopped target Timers.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Stopped target Paths.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Reached target Shutdown.
Oct 26 17:07:15 vmfsppjb006 systemd[41896]: Starting Exit the Session...
Oct 26 17:07:15 vmfsppjb006 systemd[1]: user@0.service: Killing process 41931 (systemctl) with signal SIGKILL.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 17:07:15 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 17:07:15 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 17:07:33 vmfsppjb006 python3.6[1625]: 2021-10-26T08:07:33.284573Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 16;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 17:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:07:37 vmfsppjb006 dbus-daemon[41964]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:07:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:07:38 vmfsppjb006 setroubleshoot[41964]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:07:39 vmfsppjb006 setroubleshoot[41964]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:07:39 vmfsppjb006 platform-python[41964]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 17:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 17:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 17:09:01 vmfsppjb006 systemd[1]: Started Session 98 of user omsagent.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Starting D-Bus User Message Bus Socket.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Reached target Paths.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Reached target Timers.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Listening on D-Bus User Message Bus Socket.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Reached target Sockets.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Reached target Basic System.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Reached target Default.
Oct 26 17:09:01 vmfsppjb006 systemd[42054]: Startup finished in 47ms.
Oct 26 17:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 17:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Stopped target Default.
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Stopped target Basic System.
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Stopped target Timers.
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Stopped target Sockets.
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Closed D-Bus User Message Bus Socket.
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Stopped target Paths.
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Reached target Shutdown.
Oct 26 17:09:04 vmfsppjb006 systemd[42054]: Starting Exit the Session...
Oct 26 17:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 42182 (systemctl) with signal SIGKILL.
Oct 26 17:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 17:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 17:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 17:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 17:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:09:37 vmfsppjb006 dbus-daemon[42217]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:09:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:09:38 vmfsppjb006 setroubleshoot[42217]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:09:39 vmfsppjb006 setroubleshoot[42217]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:09:39 vmfsppjb006 platform-python[42217]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:10:37 vmfsppjb006 dbus-daemon[42273]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:10:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:10:38 vmfsppjb006 setroubleshoot[42273]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:10:39 vmfsppjb006 setroubleshoot[42273]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:10:39 vmfsppjb006 platform-python[42273]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:16:43 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 17:16:44 vmfsppjb006 dnf[42624]: Metadata cache refreshed recently.
Oct 26 17:16:44 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 17:17:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:17:37 vmfsppjb006 dbus-daemon[42681]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:17:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:17:37 vmfsppjb006 setroubleshoot[42681]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:17:38 vmfsppjb006 setroubleshoot[42681]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:17:38 vmfsppjb006 platform-python[42681]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:20:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:20:37 vmfsppjb006 dbus-daemon[42858]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:20:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:20:37 vmfsppjb006 setroubleshoot[42858]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:20:38 vmfsppjb006 setroubleshoot[42858]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:20:38 vmfsppjb006 platform-python[42858]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 17:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 17:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 17:24:01 vmfsppjb006 systemd[1]: Started Session 100 of user omsagent.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Starting D-Bus User Message Bus Socket.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Reached target Paths.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Reached target Timers.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Listening on D-Bus User Message Bus Socket.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Reached target Sockets.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Reached target Basic System.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Reached target Default.
Oct 26 17:24:01 vmfsppjb006 systemd[43060]: Startup finished in 48ms.
Oct 26 17:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 17:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Stopped target Default.
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Stopped target Basic System.
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Stopped target Timers.
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Stopped target Sockets.
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Closed D-Bus User Message Bus Socket.
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Stopped target Paths.
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Reached target Shutdown.
Oct 26 17:24:03 vmfsppjb006 systemd[43060]: Starting Exit the Session...
Oct 26 17:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 43179 (systemctl) with signal SIGKILL.
Oct 26 17:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 17:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 17:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 17:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 17:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:24:37 vmfsppjb006 dbus-daemon[43216]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:24:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:24:37 vmfsppjb006 setroubleshoot[43216]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:24:38 vmfsppjb006 setroubleshoot[43216]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:24:38 vmfsppjb006 platform-python[43216]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:26:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:26:37 vmfsppjb006 dbus-daemon[43338]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:26:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:26:37 vmfsppjb006 setroubleshoot[43338]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:26:38 vmfsppjb006 setroubleshoot[43338]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:26:38 vmfsppjb006 platform-python[43338]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:37:16 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 17:37:16 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 17:37:16 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 17:37:16 vmfsppjb006 systemd[1]: Started Session c17 of user root.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Starting D-Bus User Message Bus Socket.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Reached target Timers.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Reached target Paths.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Listening on D-Bus User Message Bus Socket.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Reached target Sockets.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Reached target Basic System.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Reached target Default.
Oct 26 17:37:16 vmfsppjb006 systemd[44005]: Startup finished in 49ms.
Oct 26 17:37:16 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Stopped target Default.
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Stopped target Basic System.
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Stopped target Paths.
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Stopped target Sockets.
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Closed D-Bus User Message Bus Socket.
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Reached target Shutdown.
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Starting Exit the Session...
Oct 26 17:37:17 vmfsppjb006 systemd[44005]: Stopped target Timers.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: user@0.service: Killing process 44040 (systemctl) with signal SIGKILL.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 17:37:17 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 17:37:17 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 17:37:36 vmfsppjb006 python3.6[1625]: 2021-10-26T08:37:36.494802Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 17;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 17:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:37:37 vmfsppjb006 dbus-daemon[44072]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:37:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:37:38 vmfsppjb006 setroubleshoot[44072]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:37:38 vmfsppjb006 setroubleshoot[44072]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:37:38 vmfsppjb006 platform-python[44072]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 17:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 17:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 17:39:01 vmfsppjb006 systemd[1]: Started Session 103 of user omsagent.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Reached target Paths.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Starting D-Bus User Message Bus Socket.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Reached target Timers.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Listening on D-Bus User Message Bus Socket.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Reached target Sockets.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Reached target Basic System.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Reached target Default.
Oct 26 17:39:01 vmfsppjb006 systemd[44160]: Startup finished in 48ms.
Oct 26 17:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Stopped target Default.
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Stopped target Basic System.
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Stopped target Paths.
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Stopped target Sockets.
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Closed D-Bus User Message Bus Socket.
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Reached target Shutdown.
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Starting Exit the Session...
Oct 26 17:39:03 vmfsppjb006 systemd[44160]: Stopped target Timers.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 44279 (systemctl) with signal SIGKILL.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 17:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 17:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 17:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:39:37 vmfsppjb006 dbus-daemon[44323]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:39:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:39:38 vmfsppjb006 setroubleshoot[44323]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:39:38 vmfsppjb006 setroubleshoot[44323]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:39:38 vmfsppjb006 platform-python[44323]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:40:37 vmfsppjb006 dbus-daemon[44379]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:40:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:40:38 vmfsppjb006 setroubleshoot[44379]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:40:38 vmfsppjb006 setroubleshoot[44379]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:40:38 vmfsppjb006 platform-python[44379]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 17:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 17:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 17:54:01 vmfsppjb006 systemd[1]: Started Session 105 of user omsagent.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Starting D-Bus User Message Bus Socket.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Reached target Timers.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Reached target Paths.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Listening on D-Bus User Message Bus Socket.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Reached target Sockets.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Reached target Basic System.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Reached target Default.
Oct 26 17:54:02 vmfsppjb006 systemd[45150]: Startup finished in 46ms.
Oct 26 17:54:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Stopped target Default.
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Stopped target Basic System.
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Stopped target Sockets.
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Closed D-Bus User Message Bus Socket.
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Stopped target Paths.
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Reached target Shutdown.
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Starting Exit the Session...
Oct 26 17:54:04 vmfsppjb006 systemd[45150]: Stopped target Timers.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 45269 (systemctl) with signal SIGKILL.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 17:54:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 17:54:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 17:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:54:37 vmfsppjb006 dbus-daemon[45306]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:54:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:54:38 vmfsppjb006 setroubleshoot[45306]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:54:39 vmfsppjb006 setroubleshoot[45306]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:54:39 vmfsppjb006 platform-python[45306]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 17:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 17:55:37 vmfsppjb006 dbus-daemon[45377]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 17:55:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 17:55:38 vmfsppjb006 setroubleshoot[45377]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 17:55:39 vmfsppjb006 setroubleshoot[45377]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 17:55:39 vmfsppjb006 platform-python[45377]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:01:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:01:37 vmfsppjb006 dbus-daemon[45729]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:01:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:01:38 vmfsppjb006 setroubleshoot[45729]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:01:39 vmfsppjb006 setroubleshoot[45729]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:01:39 vmfsppjb006 platform-python[45729]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:06:48 vmfsppjb006 python3.6[1625]: 2021-10-26T09:06:48.202919Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 18:07:18 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 18:07:18 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 18:07:18 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 18:07:18 vmfsppjb006 systemd[1]: Started Session c18 of user root.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Starting D-Bus User Message Bus Socket.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Reached target Timers.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Reached target Paths.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Reached target Sockets.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Reached target Basic System.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Reached target Default.
Oct 26 18:07:18 vmfsppjb006 systemd[46128]: Startup finished in 53ms.
Oct 26 18:07:18 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 18:07:19 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 18:07:19 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Stopped target Default.
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Stopped target Basic System.
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Stopped target Sockets.
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Stopped target Paths.
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Stopped target Timers.
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Closed D-Bus User Message Bus Socket.
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Reached target Shutdown.
Oct 26 18:07:19 vmfsppjb006 systemd[46128]: Starting Exit the Session...
Oct 26 18:07:19 vmfsppjb006 systemd[1]: user@0.service: Killing process 46163 (systemctl) with signal SIGKILL.
Oct 26 18:07:19 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 18:07:19 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 18:07:19 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 18:07:19 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 18:07:19 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 18:07:19 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 18:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:07:37 vmfsppjb006 dbus-daemon[46198]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:07:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:07:38 vmfsppjb006 setroubleshoot[46198]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:07:39 vmfsppjb006 setroubleshoot[46198]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:07:39 vmfsppjb006 platform-python[46198]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:07:42 vmfsppjb006 python3.6[1625]: 2021-10-26T09:07:42.478640Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 18;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 18:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 18:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 18:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 18:09:01 vmfsppjb006 systemd[1]: Started Session 108 of user omsagent.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Reached target Paths.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Starting D-Bus User Message Bus Socket.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Reached target Timers.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Reached target Sockets.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Reached target Basic System.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Reached target Default.
Oct 26 18:09:01 vmfsppjb006 systemd[46292]: Startup finished in 49ms.
Oct 26 18:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Stopped target Default.
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Stopped target Basic System.
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Stopped target Sockets.
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Stopped target Paths.
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Closed D-Bus User Message Bus Socket.
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Reached target Shutdown.
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Starting Exit the Session...
Oct 26 18:09:03 vmfsppjb006 systemd[46292]: Stopped target Timers.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 46410 (systemctl) with signal SIGKILL.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 18:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 18:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 18:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:09:37 vmfsppjb006 dbus-daemon[46445]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:09:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:09:38 vmfsppjb006 setroubleshoot[46445]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:09:39 vmfsppjb006 setroubleshoot[46445]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:09:39 vmfsppjb006 platform-python[46445]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:10:37 vmfsppjb006 dbus-daemon[46514]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:10:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:10:38 vmfsppjb006 setroubleshoot[46514]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:10:39 vmfsppjb006 setroubleshoot[46514]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:10:39 vmfsppjb006 platform-python[46514]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:16:47 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 18:16:47 vmfsppjb006 dnf[46868]: packages-microsoft-com-prod                      11 kB/s | 3.0 kB     00:00
Oct 26 18:16:47 vmfsppjb006 dnf[46868]: MySQL 8.0 Community Server                      256 kB/s | 2.6 kB     00:00
Oct 26 18:16:47 vmfsppjb006 dnf[46868]: MySQL Connectors Community                      266 kB/s | 2.6 kB     00:00
Oct 26 18:16:47 vmfsppjb006 dnf[46868]: MySQL Tools Community                            58 kB/s | 2.6 kB     00:00
Oct 26 18:16:48 vmfsppjb006 dnf[46868]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  3.8 kB/s | 2.4 kB     00:00
Oct 26 18:16:49 vmfsppjb006 dnf[46868]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 5.1 kB/s | 2.8 kB     00:00
Oct 26 18:16:49 vmfsppjb006 dnf[46868]: Microsoft Azure RPMs for RHEL8 Extended Update  6.8 kB/s | 2.1 kB     00:00
Oct 26 18:16:50 vmfsppjb006 dnf[46868]: Zabbix Official Repository - x86_64              11 kB/s | 2.9 kB     00:00
Oct 26 18:16:50 vmfsppjb006 dnf[46868]: Zabbix Official Repository non-supported - x86_  13 kB/s | 3.0 kB     00:00
Oct 26 18:16:51 vmfsppjb006 dnf[46868]: Metadata cache created.
Oct 26 18:16:51 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 18:17:26 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 26 18:17:26 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 26 18:17:26 vmfsppjb006 journal[46915]: Job Arranger Server[46915]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 26 18:17:26 vmfsppjb006 journal[46915]: Job Arranger Server[46915]: [JASERVER000003] server #0 started [main process]
Oct 26 18:17:26 vmfsppjb006 journal[46921]: Job Arranger Server[46921]: [JASERVER000004] server #6 started [job trapper #3]
Oct 26 18:17:26 vmfsppjb006 journal[46923]: Job Arranger Server[46923]: [JASERVER000004] server #8 started [job trapper #5]
Oct 26 18:17:26 vmfsppjb006 journal[46924]: Job Arranger Server[46924]: [JASERVER000004] server #9 started [job loader #1]
Oct 26 18:17:26 vmfsppjb006 journal[46926]: Job Arranger Server[46926]: [JASERVER000004] server #11 started [message send #1]
Oct 26 18:17:26 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 26 18:17:26 vmfsppjb006 journal[46922]: Job Arranger Server[46922]: [JASERVER000004] server #7 started [job trapper #4]
Oct 26 18:17:26 vmfsppjb006 journal[46918]: Job Arranger Server[46918]: [JASERVER000004] server #3 started [check the running job #1]
Oct 26 18:17:26 vmfsppjb006 journal[46916]: Job Arranger Server[46916]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 26 18:17:26 vmfsppjb006 journal[46917]: Job Arranger Server[46917]: [JASERVER000004] server #2 started [start the job #1]
Oct 26 18:17:26 vmfsppjb006 journal[46920]: Job Arranger Server[46920]: [JASERVER000004] server #5 started [job trapper #2]
Oct 26 18:17:26 vmfsppjb006 journal[46925]: Job Arranger Server[46925]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 26 18:17:26 vmfsppjb006 journal[46927]: Job Arranger Server[46927]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 26 18:17:26 vmfsppjb006 journal[46919]: Job Arranger Server[46919]: [JASERVER000004] server #4 started [job trapper #1]
Oct 26 18:17:28 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 18:17:28 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 18:17:28 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 18:17:28 vmfsppjb006 systemd[1]: Started Session 110 of user jobuser.
Oct 26 18:17:28 vmfsppjb006 systemd-logind[931]: New session 110 of user jobuser.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Reached target Paths.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Reached target Timers.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Starting D-Bus User Message Bus Socket.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Reached target Sockets.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Reached target Basic System.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Reached target Default.
Oct 26 18:17:28 vmfsppjb006 systemd[46937]: Startup finished in 46ms.
Oct 26 18:17:28 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 18:17:28 vmfsppjb006 powershell[46963]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 18:17:28 vmfsppjb006 powershell[46963]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 46963 in AppDomain: None.
Oct 26 18:17:28 vmfsppjb006 powershell[46963]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 0f9bf3e7-2133-451e-8612-5ff1da2dc8aa#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:29 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:17:37 vmfsppjb006 dbus-daemon[46997]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:17:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:17:38 vmfsppjb006 setroubleshoot[46997]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:17:39 vmfsppjb006 setroubleshoot[46997]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:17:39 vmfsppjb006 platform-python[46997]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:17:41 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 18:17:41 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012Nyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: d69ef904-609b-4e95-a626-e4d69aa4573e#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 18:17:41 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 73e6984c-6a9e-4e9e-8d8f-3397abbf3518#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 18:17:54 vmfsppjb006 powershell[46963]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 98842d37-c591-4cca-ae78-ccd4a4bde1d6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e71726d3-674b-4ea8-a944-b346c3ad9c15#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 492#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:17:54 vmfsppjb006 powershell[46963]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 46963 in AppDomain: None.  Error Message: Operation canceled.
Oct 26 18:17:54 vmfsppjb006 systemd-logind[931]: Session 110 logged out. Waiting for processes to exit.
Oct 26 18:17:54 vmfsppjb006 systemd-logind[931]: Removed session 110.
Oct 26 18:17:54 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 18:17:54 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Stopped target Default.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Stopped target Basic System.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Stopped target Sockets.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Closed D-Bus User Message Bus Socket.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Stopped target Paths.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Stopped target Timers.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Reached target Shutdown.
Oct 26 18:17:54 vmfsppjb006 systemd[46937]: Starting Exit the Session...
Oct 26 18:17:54 vmfsppjb006 systemd[1]: user@1003.service: Killing process 47030 (systemctl) with signal SIGKILL.
Oct 26 18:17:54 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 18:17:54 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 18:17:54 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 18:17:54 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 18:17:54 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 18:17:54 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 18:18:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:18:37 vmfsppjb006 dbus-daemon[47077]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:18:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:18:38 vmfsppjb006 setroubleshoot[47077]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:18:39 vmfsppjb006 setroubleshoot[47077]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:18:39 vmfsppjb006 platform-python[47077]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:20:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:20:37 vmfsppjb006 dbus-daemon[47194]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:20:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:20:38 vmfsppjb006 setroubleshoot[47194]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:20:39 vmfsppjb006 setroubleshoot[47194]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:20:39 vmfsppjb006 platform-python[47194]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 18:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 18:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 18:24:01 vmfsppjb006 systemd[1]: Started Session 112 of user omsagent.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Reached target Timers.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Starting D-Bus User Message Bus Socket.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Reached target Paths.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Reached target Sockets.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Reached target Basic System.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Reached target Default.
Oct 26 18:24:01 vmfsppjb006 systemd[47395]: Startup finished in 49ms.
Oct 26 18:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 18:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Stopped target Default.
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Stopped target Basic System.
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Stopped target Sockets.
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Closed D-Bus User Message Bus Socket.
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Stopped target Timers.
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Stopped target Paths.
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Reached target Shutdown.
Oct 26 18:24:03 vmfsppjb006 systemd[47395]: Starting Exit the Session...
Oct 26 18:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 47515 (systemctl) with signal SIGKILL.
Oct 26 18:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 18:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 18:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 18:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 18:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:24:37 vmfsppjb006 dbus-daemon[47550]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:24:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:24:38 vmfsppjb006 setroubleshoot[47550]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:24:39 vmfsppjb006 setroubleshoot[47550]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:24:39 vmfsppjb006 platform-python[47550]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:27:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:27:37 vmfsppjb006 dbus-daemon[47733]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:27:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:27:37 vmfsppjb006 setroubleshoot[47733]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:27:38 vmfsppjb006 setroubleshoot[47733]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:27:38 vmfsppjb006 platform-python[47733]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:29:45 vmfsppjb006 powershell[47859]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 18:29:45 vmfsppjb006 powershell[47859]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47859 in AppDomain: None.
Oct 26 18:29:45 vmfsppjb006 powershell[47859]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 18:30:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:30:37 vmfsppjb006 dbus-daemon[47950]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:30:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:30:37 vmfsppjb006 setroubleshoot[47950]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:30:38 vmfsppjb006 setroubleshoot[47950]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:30:38 vmfsppjb006 platform-python[47950]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:37:20 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 18:37:20 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 18:37:20 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 18:37:20 vmfsppjb006 systemd[1]: Started Session c19 of user root.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Reached target Paths.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Reached target Timers.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Starting D-Bus User Message Bus Socket.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Reached target Sockets.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Reached target Basic System.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Reached target Default.
Oct 26 18:37:20 vmfsppjb006 systemd[48449]: Startup finished in 49ms.
Oct 26 18:37:20 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 18:37:21 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 18:37:21 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Stopped target Default.
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Stopped target Basic System.
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Stopped target Sockets.
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Closed D-Bus User Message Bus Socket.
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Stopped target Timers.
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Stopped target Paths.
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Reached target Shutdown.
Oct 26 18:37:21 vmfsppjb006 systemd[48449]: Starting Exit the Session...
Oct 26 18:37:21 vmfsppjb006 systemd[1]: user@0.service: Killing process 48485 (systemctl) with signal SIGKILL.
Oct 26 18:37:21 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 18:37:21 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 18:37:21 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 18:37:21 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 18:37:21 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 18:37:21 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 18:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:37:37 vmfsppjb006 dbus-daemon[48514]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:37:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:37:37 vmfsppjb006 setroubleshoot[48514]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:37:38 vmfsppjb006 setroubleshoot[48514]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:37:38 vmfsppjb006 platform-python[48514]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:37:42 vmfsppjb006 python3.6[1625]: 2021-10-26T09:37:42.943746Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 19;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 18:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 18:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 18:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 18:39:01 vmfsppjb006 systemd[1]: Started Session 115 of user omsagent.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Starting D-Bus User Message Bus Socket.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Reached target Paths.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Reached target Timers.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Reached target Sockets.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Reached target Basic System.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Reached target Default.
Oct 26 18:39:01 vmfsppjb006 systemd[48612]: Startup finished in 47ms.
Oct 26 18:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Stopped target Default.
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Stopped target Basic System.
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Stopped target Sockets.
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Closed D-Bus User Message Bus Socket.
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Stopped target Paths.
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Reached target Shutdown.
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Starting Exit the Session...
Oct 26 18:39:04 vmfsppjb006 systemd[48612]: Stopped target Timers.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 48730 (systemctl) with signal SIGKILL.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 18:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 18:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 18:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:39:37 vmfsppjb006 dbus-daemon[48769]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:39:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:39:38 vmfsppjb006 setroubleshoot[48769]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:39:38 vmfsppjb006 setroubleshoot[48769]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:39:38 vmfsppjb006 platform-python[48769]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:40:37 vmfsppjb006 dbus-daemon[48840]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:40:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:40:38 vmfsppjb006 setroubleshoot[48840]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:40:38 vmfsppjb006 setroubleshoot[48840]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:40:38 vmfsppjb006 platform-python[48840]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:46:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:46:37 vmfsppjb006 dbus-daemon[49227]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:46:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:46:38 vmfsppjb006 setroubleshoot[49227]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:46:38 vmfsppjb006 setroubleshoot[49227]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:46:38 vmfsppjb006 platform-python[49227]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:49:51 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 26 18:49:51 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 26 18:49:51 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 26 18:49:51 vmfsppjb006 systemd[1]: Started Session 117 of user jobuser.
Oct 26 18:49:51 vmfsppjb006 systemd-logind[931]: New session 117 of user jobuser.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Reached target Paths.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Reached target Timers.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Starting D-Bus User Message Bus Socket.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Reached target Sockets.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Reached target Basic System.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Reached target Default.
Oct 26 18:49:51 vmfsppjb006 systemd[49436]: Startup finished in 47ms.
Oct 26 18:49:51 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 49462 in AppDomain: None.
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: d8725828-0cf3-4bf8-aac3-6cb1b773587f#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:49:51 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:50:04 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 26 18:50:04 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012yKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: b5597de6-97b9-4832-bfd2-7c925de0753c#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 18:50:05 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: f244266c-a0f5-4c4b-ae0d-255f4996828d#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 26 18:50:06 vmfsppjb006 powershell[49462]: (7.1.4:8:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 971192e6-31b8-40ce-83dc-cfcfc70f10de#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx 30 10#012        Engine Version = 7.1.4#012        Runspace ID = 19443e90-7faf-49aa-a225-c238aa26842f#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 462#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 26 18:50:07 vmfsppjb006 systemd-logind[931]: Session 117 logged out. Waiting for processes to exit.
Oct 26 18:50:07 vmfsppjb006 systemd-logind[931]: Removed session 117.
Oct 26 18:50:07 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 18:50:07 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Stopped target Default.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Stopped target Basic System.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Stopped target Paths.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Stopped target Sockets.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Closed D-Bus User Message Bus Socket.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Stopped target Timers.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Reached target Shutdown.
Oct 26 18:50:07 vmfsppjb006 systemd[49436]: Starting Exit the Session...
Oct 26 18:50:07 vmfsppjb006 systemd[1]: user@1003.service: Killing process 49507 (systemctl) with signal SIGKILL.
Oct 26 18:50:07 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 18:50:07 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 26 18:50:07 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 26 18:50:07 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 26 18:50:07 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 26 18:50:07 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 26 18:50:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:50:37 vmfsppjb006 dbus-daemon[49543]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:50:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:50:38 vmfsppjb006 setroubleshoot[49543]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:50:38 vmfsppjb006 setroubleshoot[49543]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:50:38 vmfsppjb006 platform-python[49543]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:51:47 vmfsppjb006 journal[46916]: Job Arranger Server[46916]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000150, jobnet_id: JOBNET_2, user_name: Admin
Oct 26 18:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 18:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 18:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 18:54:01 vmfsppjb006 systemd[1]: Started Session 119 of user omsagent.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Reached target Timers.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Reached target Paths.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Starting D-Bus User Message Bus Socket.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Listening on D-Bus User Message Bus Socket.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Reached target Sockets.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Reached target Basic System.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Reached target Default.
Oct 26 18:54:01 vmfsppjb006 systemd[49754]: Startup finished in 46ms.
Oct 26 18:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 18:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Stopped target Default.
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Stopped target Basic System.
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Stopped target Paths.
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Stopped target Timers.
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Stopped target Sockets.
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Closed D-Bus User Message Bus Socket.
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Reached target Shutdown.
Oct 26 18:54:03 vmfsppjb006 systemd[49754]: Starting Exit the Session...
Oct 26 18:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 49872 (systemctl) with signal SIGKILL.
Oct 26 18:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:54:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 18:54:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 18:54:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 18:54:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 18:54:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 18:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:54:37 vmfsppjb006 dbus-daemon[49919]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:54:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:54:38 vmfsppjb006 setroubleshoot[49919]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:54:38 vmfsppjb006 setroubleshoot[49919]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:54:38 vmfsppjb006 platform-python[49919]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 18:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 18:55:37 vmfsppjb006 dbus-daemon[49984]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 18:55:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 18:55:38 vmfsppjb006 setroubleshoot[49984]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 18:55:38 vmfsppjb006 setroubleshoot[49984]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 18:55:38 vmfsppjb006 platform-python[49984]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:01:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:01:37 vmfsppjb006 dbus-daemon[50375]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:01:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:01:38 vmfsppjb006 setroubleshoot[50375]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:01:38 vmfsppjb006 setroubleshoot[50375]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:01:38 vmfsppjb006 platform-python[50375]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:06:49 vmfsppjb006 python3.6[1625]: 2021-10-26T10:06:49.003829Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 19:07:22 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 19:07:22 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 19:07:22 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 19:07:22 vmfsppjb006 systemd[1]: Started Session c20 of user root.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Reached target Paths.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Reached target Timers.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Starting D-Bus User Message Bus Socket.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Listening on D-Bus User Message Bus Socket.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Reached target Sockets.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Reached target Basic System.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Reached target Default.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Startup finished in 48ms.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Stopped target Default.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Stopped target Basic System.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Stopped target Timers.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Stopped target Paths.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Stopped target Sockets.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Closed D-Bus User Message Bus Socket.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Reached target Shutdown.
Oct 26 19:07:23 vmfsppjb006 systemd[50797]: Starting Exit the Session...
Oct 26 19:07:23 vmfsppjb006 systemd[1]: user@0.service: Killing process 50833 (systemctl) with signal SIGKILL.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 19:07:23 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 19:07:23 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 19:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:07:37 vmfsppjb006 dbus-daemon[50862]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:07:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:07:38 vmfsppjb006 setroubleshoot[50862]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:07:39 vmfsppjb006 setroubleshoot[50862]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:07:39 vmfsppjb006 platform-python[50862]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:07:43 vmfsppjb006 python3.6[1625]: 2021-10-26T10:07:43.209221Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 20;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 19:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 19:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 19:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 19:09:01 vmfsppjb006 systemd[1]: Started Session 122 of user omsagent.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Reached target Timers.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Reached target Paths.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Starting D-Bus User Message Bus Socket.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Listening on D-Bus User Message Bus Socket.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Reached target Sockets.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Reached target Basic System.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Reached target Default.
Oct 26 19:09:01 vmfsppjb006 systemd[50962]: Startup finished in 46ms.
Oct 26 19:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 19:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Stopped target Default.
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Stopped target Basic System.
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Stopped target Sockets.
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Stopped target Paths.
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Closed D-Bus User Message Bus Socket.
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Reached target Shutdown.
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Stopped target Timers.
Oct 26 19:09:03 vmfsppjb006 systemd[50962]: Starting Exit the Session...
Oct 26 19:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 51090 (systemctl) with signal SIGKILL.
Oct 26 19:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 19:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 19:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 19:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 19:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:09:37 vmfsppjb006 dbus-daemon[51127]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:09:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:09:38 vmfsppjb006 setroubleshoot[51127]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:09:39 vmfsppjb006 setroubleshoot[51127]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:09:39 vmfsppjb006 platform-python[51127]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:10:37 vmfsppjb006 dbus-daemon[51195]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:10:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:10:38 vmfsppjb006 setroubleshoot[51195]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:10:39 vmfsppjb006 setroubleshoot[51195]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:10:39 vmfsppjb006 platform-python[51195]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:16:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:16:37 vmfsppjb006 dbus-daemon[51572]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:16:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:16:38 vmfsppjb006 setroubleshoot[51572]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:16:39 vmfsppjb006 setroubleshoot[51572]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:16:39 vmfsppjb006 platform-python[51572]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:16:55 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 19:16:55 vmfsppjb006 dnf[51600]: Metadata cache refreshed recently.
Oct 26 19:16:55 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 19:20:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:20:37 vmfsppjb006 dbus-daemon[51824]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:20:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:20:38 vmfsppjb006 setroubleshoot[51824]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:20:39 vmfsppjb006 setroubleshoot[51824]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:20:39 vmfsppjb006 platform-python[51824]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 19:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 19:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 19:24:01 vmfsppjb006 systemd[1]: Started Session 124 of user omsagent.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Starting D-Bus User Message Bus Socket.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Reached target Paths.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Reached target Timers.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Listening on D-Bus User Message Bus Socket.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Reached target Sockets.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Reached target Basic System.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Reached target Default.
Oct 26 19:24:01 vmfsppjb006 systemd[52048]: Startup finished in 50ms.
Oct 26 19:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 19:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:24:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Stopped target Default.
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Stopped target Basic System.
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Stopped target Paths.
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Stopped target Timers.
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Stopped target Sockets.
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Closed D-Bus User Message Bus Socket.
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Reached target Shutdown.
Oct 26 19:24:03 vmfsppjb006 systemd[52048]: Starting Exit the Session...
Oct 26 19:24:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 52167 (systemctl) with signal SIGKILL.
Oct 26 19:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:24:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 19:24:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:24:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 19:24:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 19:24:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 19:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:24:37 vmfsppjb006 dbus-daemon[52204]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:24:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:24:38 vmfsppjb006 setroubleshoot[52204]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:24:39 vmfsppjb006 setroubleshoot[52204]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:24:39 vmfsppjb006 platform-python[52204]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:26:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:26:37 vmfsppjb006 dbus-daemon[52336]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:26:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:26:38 vmfsppjb006 setroubleshoot[52336]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:26:39 vmfsppjb006 setroubleshoot[52336]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:26:39 vmfsppjb006 platform-python[52336]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:37:24 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 19:37:24 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 19:37:24 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 19:37:24 vmfsppjb006 systemd[1]: Started Session c21 of user root.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Starting D-Bus User Message Bus Socket.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Reached target Paths.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Reached target Timers.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Listening on D-Bus User Message Bus Socket.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Reached target Sockets.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Reached target Basic System.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Reached target Default.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Startup finished in 45ms.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Stopped target Default.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Stopped target Basic System.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Stopped target Sockets.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Closed D-Bus User Message Bus Socket.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Stopped target Timers.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Stopped target Paths.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Reached target Shutdown.
Oct 26 19:37:25 vmfsppjb006 systemd[53090]: Starting Exit the Session...
Oct 26 19:37:25 vmfsppjb006 systemd[1]: user@0.service: Killing process 53126 (systemctl) with signal SIGKILL.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 19:37:25 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 19:37:25 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 19:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:37:37 vmfsppjb006 dbus-daemon[53153]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:37:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:37:37 vmfsppjb006 setroubleshoot[53153]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:37:38 vmfsppjb006 setroubleshoot[53153]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:37:38 vmfsppjb006 platform-python[53153]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:37:43 vmfsppjb006 python3.6[1625]: 2021-10-26T10:37:43.527301Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 21;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 19:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 19:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 19:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 19:39:01 vmfsppjb006 systemd[1]: Started Session 127 of user omsagent.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Reached target Paths.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Reached target Timers.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Starting D-Bus User Message Bus Socket.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Listening on D-Bus User Message Bus Socket.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Reached target Sockets.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Reached target Basic System.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Reached target Default.
Oct 26 19:39:01 vmfsppjb006 systemd[53250]: Startup finished in 50ms.
Oct 26 19:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 19:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:39:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Stopped target Default.
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Stopped target Basic System.
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Stopped target Timers.
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Stopped target Paths.
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Stopped target Sockets.
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Closed D-Bus User Message Bus Socket.
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Reached target Shutdown.
Oct 26 19:39:03 vmfsppjb006 systemd[53250]: Starting Exit the Session...
Oct 26 19:39:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 53368 (systemctl) with signal SIGKILL.
Oct 26 19:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:39:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 19:39:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:39:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 19:39:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 19:39:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 19:39:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:39:37 vmfsppjb006 dbus-daemon[53406]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:39:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:39:37 vmfsppjb006 setroubleshoot[53406]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:39:38 vmfsppjb006 setroubleshoot[53406]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:39:38 vmfsppjb006 platform-python[53406]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:40:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:40:37 vmfsppjb006 dbus-daemon[53478]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:40:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:40:37 vmfsppjb006 setroubleshoot[53478]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:40:38 vmfsppjb006 setroubleshoot[53478]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:40:38 vmfsppjb006 platform-python[53478]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:46:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:46:37 vmfsppjb006 dbus-daemon[53852]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:46:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:46:37 vmfsppjb006 setroubleshoot[53852]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:46:38 vmfsppjb006 setroubleshoot[53852]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:46:38 vmfsppjb006 platform-python[53852]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 19:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 19:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 19:54:01 vmfsppjb006 systemd[1]: Started Session 129 of user omsagent.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Starting D-Bus User Message Bus Socket.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Reached target Paths.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Reached target Timers.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Listening on D-Bus User Message Bus Socket.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Reached target Sockets.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Reached target Basic System.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Reached target Default.
Oct 26 19:54:02 vmfsppjb006 systemd[54315]: Startup finished in 44ms.
Oct 26 19:54:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 19:54:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:54:05 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Stopped target Default.
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Stopped target Basic System.
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Stopped target Timers.
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Stopped target Sockets.
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Closed D-Bus User Message Bus Socket.
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Stopped target Paths.
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Reached target Shutdown.
Oct 26 19:54:05 vmfsppjb006 systemd[54315]: Starting Exit the Session...
Oct 26 19:54:05 vmfsppjb006 systemd[1]: user@986.service: Killing process 54434 (systemctl) with signal SIGKILL.
Oct 26 19:54:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:54:05 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 19:54:05 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 19:54:05 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 19:54:05 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 19:54:05 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 19:54:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:54:37 vmfsppjb006 dbus-daemon[54471]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:54:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:54:38 vmfsppjb006 setroubleshoot[54471]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:54:38 vmfsppjb006 setroubleshoot[54471]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:54:38 vmfsppjb006 platform-python[54471]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 19:55:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 19:55:37 vmfsppjb006 dbus-daemon[54547]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 19:55:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 19:55:38 vmfsppjb006 setroubleshoot[54547]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 19:55:38 vmfsppjb006 setroubleshoot[54547]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 19:55:38 vmfsppjb006 platform-python[54547]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:01:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:01:37 vmfsppjb006 dbus-daemon[54942]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:01:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:01:38 vmfsppjb006 setroubleshoot[54942]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:01:38 vmfsppjb006 setroubleshoot[54942]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:01:38 vmfsppjb006 platform-python[54942]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:06:49 vmfsppjb006 python3.6[1625]: 2021-10-26T11:06:49.342843Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 26 20:07:26 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 20:07:26 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 20:07:26 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 20:07:26 vmfsppjb006 systemd[1]: Started Session c22 of user root.
Oct 26 20:07:26 vmfsppjb006 systemd[55363]: Reached target Timers.
Oct 26 20:07:26 vmfsppjb006 systemd[55363]: Starting D-Bus User Message Bus Socket.
Oct 26 20:07:26 vmfsppjb006 systemd[55363]: Reached target Paths.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Listening on D-Bus User Message Bus Socket.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Reached target Sockets.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Reached target Basic System.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Reached target Default.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Startup finished in 46ms.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Stopped target Default.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Stopped target Basic System.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Stopped target Paths.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Stopped target Sockets.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Stopped target Timers.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Closed D-Bus User Message Bus Socket.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Reached target Shutdown.
Oct 26 20:07:27 vmfsppjb006 systemd[55363]: Starting Exit the Session...
Oct 26 20:07:27 vmfsppjb006 systemd[1]: user@0.service: Killing process 55398 (systemctl) with signal SIGKILL.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 20:07:27 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 20:07:27 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 20:07:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:07:37 vmfsppjb006 dbus-daemon[55427]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:07:37 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:07:38 vmfsppjb006 setroubleshoot[55427]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:07:38 vmfsppjb006 setroubleshoot[55427]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:07:38 vmfsppjb006 platform-python[55427]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:07:43 vmfsppjb006 python3.6[1625]: 2021-10-26T11:07:43.631495Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 22;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 20:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 20:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 20:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 20:09:01 vmfsppjb006 systemd[1]: Started Session 132 of user omsagent.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Reached target Paths.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Reached target Timers.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Starting D-Bus User Message Bus Socket.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Listening on D-Bus User Message Bus Socket.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Reached target Sockets.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Reached target Basic System.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Reached target Default.
Oct 26 20:09:01 vmfsppjb006 systemd[55527]: Startup finished in 47ms.
Oct 26 20:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 20:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:09:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Stopped target Default.
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Stopped target Basic System.
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Stopped target Paths.
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Stopped target Timers.
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Stopped target Sockets.
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Closed D-Bus User Message Bus Socket.
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Reached target Shutdown.
Oct 26 20:09:04 vmfsppjb006 systemd[55527]: Starting Exit the Session...
Oct 26 20:09:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 55645 (systemctl) with signal SIGKILL.
Oct 26 20:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:09:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 20:09:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:09:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 20:09:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 20:09:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 20:09:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:09:37 vmfsppjb006 dbus-daemon[55688]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:09:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:09:38 vmfsppjb006 setroubleshoot[55688]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:09:38 vmfsppjb006 setroubleshoot[55688]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:09:38 vmfsppjb006 platform-python[55688]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:10:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:10:37 vmfsppjb006 dbus-daemon[55753]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:10:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:10:38 vmfsppjb006 setroubleshoot[55753]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:10:38 vmfsppjb006 setroubleshoot[55753]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:10:38 vmfsppjb006 platform-python[55753]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:16:56 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 26 20:16:56 vmfsppjb006 dnf[56156]: Metadata cache refreshed recently.
Oct 26 20:16:56 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 26 20:17:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:17:37 vmfsppjb006 dbus-daemon[56192]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:17:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:17:38 vmfsppjb006 setroubleshoot[56192]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:17:39 vmfsppjb006 setroubleshoot[56192]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:17:39 vmfsppjb006 platform-python[56192]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:21:30 vmfsppjb006 systemd-logind[931]: Session 5 logged out. Waiting for processes to exit.
Oct 26 20:21:30 vmfsppjb006 systemd-logind[931]: Removed session 5.
Oct 26 20:21:36 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:21:36 vmfsppjb006 dbus-daemon[56461]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:21:36 vmfsppjb006 systemd-logind[931]: Session 3 logged out. Waiting for processes to exit.
Oct 26 20:21:36 vmfsppjb006 systemd-logind[931]: Removed session 3.
Oct 26 20:21:36 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:21:37 vmfsppjb006 setroubleshoot[56461]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:21:37 vmfsppjb006 setroubleshoot[56461]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:21:37 vmfsppjb006 platform-python[56461]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 20:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 20:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 20:24:01 vmfsppjb006 systemd[1]: Started Session 134 of user omsagent.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Reached target Paths.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Starting D-Bus User Message Bus Socket.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Reached target Timers.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Listening on D-Bus User Message Bus Socket.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Reached target Sockets.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Reached target Basic System.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Reached target Default.
Oct 26 20:24:01 vmfsppjb006 systemd[56623]: Startup finished in 44ms.
Oct 26 20:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 20:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:24:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Stopped target Default.
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Stopped target Basic System.
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Stopped target Paths.
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Stopped target Timers.
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Stopped target Sockets.
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Closed D-Bus User Message Bus Socket.
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Reached target Shutdown.
Oct 26 20:24:04 vmfsppjb006 systemd[56623]: Starting Exit the Session...
Oct 26 20:24:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 56751 (systemctl) with signal SIGKILL.
Oct 26 20:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:24:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 20:24:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:24:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 20:24:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 20:24:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 26 20:24:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:24:37 vmfsppjb006 dbus-daemon[56794]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:24:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:24:38 vmfsppjb006 setroubleshoot[56794]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:24:39 vmfsppjb006 setroubleshoot[56794]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:24:39 vmfsppjb006 platform-python[56794]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:25:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:25:37 vmfsppjb006 dbus-daemon[56869]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:25:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:25:38 vmfsppjb006 setroubleshoot[56869]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:25:39 vmfsppjb006 setroubleshoot[56869]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:25:39 vmfsppjb006 platform-python[56869]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:30:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:30:37 vmfsppjb006 dbus-daemon[57200]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:30:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:30:38 vmfsppjb006 setroubleshoot[57200]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:30:39 vmfsppjb006 setroubleshoot[57200]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:30:39 vmfsppjb006 platform-python[57200]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:30:48 vmfsppjb006 systemd-logind[931]: Session 68 logged out. Waiting for processes to exit.
Oct 26 20:30:48 vmfsppjb006 systemd-logind[931]: Removed session 68.
Oct 26 20:30:51 vmfsppjb006 systemd-logind[931]: Session 60 logged out. Waiting for processes to exit.
Oct 26 20:30:51 vmfsppjb006 systemd-logind[931]: Removed session 60.
Oct 26 20:30:51 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 26 20:30:51 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1000...
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Stopped target Default.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Stopped target Basic System.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Stopped target Paths.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Stopped target Timers.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Stopped target Sockets.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Closed D-Bus User Message Bus Socket.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Reached target Shutdown.
Oct 26 20:30:51 vmfsppjb006 systemd[7065]: Starting Exit the Session...
Oct 26 20:30:51 vmfsppjb006 systemd[1]: user@1000.service: Killing process 57231 (systemctl) with signal SIGKILL.
Oct 26 20:30:51 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 26 20:30:51 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1000.
Oct 26 20:30:51 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 26 20:30:51 vmfsppjb006 systemd[1]: Stopping /run/user/1000 mount wrapper...
Oct 26 20:30:51 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1000.
Oct 26 20:30:52 vmfsppjb006 systemd[1]: Stopped /run/user/1000 mount wrapper.
Oct 26 20:31:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:31:37 vmfsppjb006 dbus-daemon[57293]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:31:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:31:38 vmfsppjb006 setroubleshoot[57293]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:31:39 vmfsppjb006 setroubleshoot[57293]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:31:39 vmfsppjb006 platform-python[57293]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:37:28 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 26 20:37:28 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 26 20:37:28 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 26 20:37:28 vmfsppjb006 systemd[1]: Started Session c23 of user root.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Reached target Paths.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Starting D-Bus User Message Bus Socket.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Reached target Timers.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Listening on D-Bus User Message Bus Socket.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Reached target Sockets.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Reached target Basic System.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Reached target Default.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Startup finished in 46ms.
Oct 26 20:37:28 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 26 20:37:28 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 20:37:28 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Stopped target Default.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Stopped target Basic System.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Stopped target Timers.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Stopped target Sockets.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Closed D-Bus User Message Bus Socket.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Stopped target Paths.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Reached target Shutdown.
Oct 26 20:37:28 vmfsppjb006 systemd[57698]: Starting Exit the Session...
Oct 26 20:37:29 vmfsppjb006 systemd[1]: user@0.service: Killing process 57735 (systemctl) with signal SIGKILL.
Oct 26 20:37:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 20:37:29 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 26 20:37:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 26 20:37:29 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 26 20:37:29 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 26 20:37:29 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 26 20:37:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:37:37 vmfsppjb006 dbus-daemon[57756]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:37:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:37:38 vmfsppjb006 setroubleshoot[57756]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:37:39 vmfsppjb006 setroubleshoot[57756]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:37:39 vmfsppjb006 platform-python[57756]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:37:43 vmfsppjb006 python3.6[1625]: 2021-10-26T11:37:43.855918Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 23;HeartbeatId: 5DB207D5-6EBC-4922-964C-5F271B4EF5E8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 26 20:38:37 vmfsppjb006 dbus-daemon[889]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.49' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 26 20:38:37 vmfsppjb006 dbus-daemon[57819]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 26 20:38:38 vmfsppjb006 dbus-daemon[889]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 26 20:38:38 vmfsppjb006 setroubleshoot[57819]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 26 20:38:39 vmfsppjb006 setroubleshoot[57819]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 26 20:38:39 vmfsppjb006 platform-python[57819]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 26 20:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 26 20:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 26 20:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 26 20:39:01 vmfsppjb006 systemd[1]: Started Session 137 of user omsagent.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Starting D-Bus User Message Bus Socket.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Reached target Paths.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Reached target Timers.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Listening on D-Bus User Message Bus Socket.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Reached target Sockets.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Reached target Basic System.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Reached target Default.
Oct 26 20:39:01 vmfsppjb006 systemd[57862]: Startup finished in 45ms.
Oct 26 20:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 26 20:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:39:04 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Stopped target Default.
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Stopped target Basic System.
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Stopped target Timers.
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Stopped target Sockets.
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Closed D-Bus User Message Bus Socket.
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Stopped target Paths.
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Reached target Shutdown.
Oct 26 20:39:04 vmfsppjb006 systemd[57862]: Starting Exit the Session...
Oct 26 20:39:04 vmfsppjb006 systemd[1]: user@986.service: Killing process 57981 (systemctl) with signal SIGKILL.
Oct 26 20:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:39:04 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 26 20:39:04 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 26 20:39:04 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 26 20:39:04 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 26 20:39:04 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 09:07:46 vmfsppjb006 kernel: Command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Oct 27 09:07:46 vmfsppjb006 kernel: x86/fpu: Enabled xstate features 0xff, context size is 2560 bytes, using 'compacted' format.
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-provided physical RAM map:
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ffeffff] usable
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003fff0000-0x000000003fffefff] ACPI data
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] ACPI NVS
Oct 27 09:07:46 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable
Oct 27 09:07:46 vmfsppjb006 kernel: printk: bootconsole [earlyser0] enabled
Oct 27 09:07:46 vmfsppjb006 kernel: NX (Execute Disable) protection: active
Oct 27 09:07:46 vmfsppjb006 kernel: SMBIOS 2.3 present.
Oct 27 09:07:46 vmfsppjb006 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008  12/07/2018
Oct 27 09:07:46 vmfsppjb006 kernel: Hypervisor detected: Microsoft Hyper-V
Oct 27 09:07:46 vmfsppjb006 kernel: Hyper-V: features 0x2e7f, hints 0x60c2c
Oct 27 09:07:46 vmfsppjb006 kernel: Hyper-V Host Build:18362-10.0-3-0.3356
Oct 27 09:07:46 vmfsppjb006 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40
Oct 27 09:07:46 vmfsppjb006 kernel: tsc: Marking TSC unstable due to running on Hyper-V
Oct 27 09:07:46 vmfsppjb006 kernel: Hyper-V: Using hypercall for remote TLB flush
Oct 27 09:07:46 vmfsppjb006 kernel: tsc: Detected 2593.905 MHz processor
Oct 27 09:07:46 vmfsppjb006 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000
Oct 27 09:07:46 vmfsppjb006 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct 27 09:07:46 vmfsppjb006 kernel: last_pfn = 0x3fff0 max_arch_pfn = 0x400000000
Oct 27 09:07:46 vmfsppjb006 kernel: found SMP MP-table at [mem 0x000ff780-0x000ff78f]
Oct 27 09:07:46 vmfsppjb006 kernel: kexec: Reserving the low 1M of memory for crashkernel
Oct 27 09:07:46 vmfsppjb006 kernel: Using GB pages for direct mapping
Oct 27 09:07:46 vmfsppjb006 kernel: RAMDISK: [mem 0x34c8a000-0x3663cfff]
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Early table checksum verification disabled
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: RSDP 0x00000000000F5C00 000014 (v00 ACPIAM)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: RSDT 0x000000003FFF0000 000040 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: FACP 0x000000003FFF0200 000081 (v02 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: DSDT 0x000000003FFF1D24 003CD5 (v01 MSFTVM MSFTVM02 00000002 INTL 02002026)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: FACS 0x000000003FFFF000 000040
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: WAET 0x000000003FFF1A80 000028 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SLIC 0x000000003FFF1AC0 000176 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: OEM0 0x000000003FFF1CC0 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SRAT 0x000000003FFF0800 000130 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: APIC 0x000000003FFF0300 00005A (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: OEMB 0x000000003FFFF040 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 27 09:07:46 vmfsppjb006 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x13fffffff] hotplug
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x140200000-0xfdfffffff] hotplug
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000200000-0x1ffffffffff] hotplug
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000200000-0x3ffffffffff] hotplug
Oct 27 09:07:46 vmfsppjb006 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x13fffffff] -> [mem 0x00000000-0x13fffffff]
Oct 27 09:07:46 vmfsppjb006 kernel: NODE_DATA(0) allocated [mem 0x13ffd6000-0x13fffffff]
Oct 27 09:07:46 vmfsppjb006 kernel: Using crashkernel=auto, the size chosen is a best effort estimation.
Oct 27 09:07:46 vmfsppjb006 kernel: Reserving 160MB of memory at 672MB for crashkernel (System RAM: 2047MB)
Oct 27 09:07:46 vmfsppjb006 kernel: Zone ranges:
Oct 27 09:07:46 vmfsppjb006 kernel:  DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct 27 09:07:46 vmfsppjb006 kernel:  DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Oct 27 09:07:46 vmfsppjb006 kernel:  Normal   [mem 0x0000000100000000-0x000000013fffffff]
Oct 27 09:07:46 vmfsppjb006 kernel:  Device   empty
Oct 27 09:07:46 vmfsppjb006 kernel: Movable zone start for each node
Oct 27 09:07:46 vmfsppjb006 kernel: Early memory node ranges
Oct 27 09:07:46 vmfsppjb006 kernel:  node   0: [mem 0x0000000000001000-0x000000000009efff]
Oct 27 09:07:46 vmfsppjb006 kernel:  node   0: [mem 0x0000000000100000-0x000000003ffeffff]
Oct 27 09:07:46 vmfsppjb006 kernel:  node   0: [mem 0x0000000100000000-0x000000013fffffff]
Oct 27 09:07:46 vmfsppjb006 kernel: Zeroed struct page in unavailable ranges: 114 pages
Oct 27 09:07:46 vmfsppjb006 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff]
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: PM-Timer IO Port: 0x408
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Oct 27 09:07:46 vmfsppjb006 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct 27 09:07:46 vmfsppjb006 kernel: Using ACPI (MADT) for SMP configuration information
Oct 27 09:07:46 vmfsppjb006 kernel: smpboot: Allowing 1 CPUs, 0 hotplug CPUs
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff]
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff]
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff]
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3fff0000-0x3fffefff]
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3ffff000-0x3fffffff]
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x40000000-0xffffffff]
Oct 27 09:07:46 vmfsppjb006 kernel: [mem 0x40000000-0xffffffff] available for PCI devices
Oct 27 09:07:46 vmfsppjb006 kernel: Booting paravirtualized kernel on bare hardware
Oct 27 09:07:46 vmfsppjb006 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct 27 09:07:46 vmfsppjb006 kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:1 nr_cpu_ids:1 nr_node_ids:1
Oct 27 09:07:46 vmfsppjb006 kernel: percpu: Embedded 53 pages/cpu s180224 r8192 d28672 u2097152
Oct 27 09:07:46 vmfsppjb006 kernel: Hyper-V: PV spinlocks enabled
Oct 27 09:07:46 vmfsppjb006 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 515824
Oct 27 09:07:46 vmfsppjb006 kernel: Policy zone: Normal
Oct 27 09:07:46 vmfsppjb006 kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 27 09:07:46 vmfsppjb006 kernel: Specific versions of hardware are certified with Red Hat Enterprise Linux 8. Please see the list of hardware certified with Red Hat Enterprise Linux 8 at https://access.redhat.com/ecosystem.
Oct 27 09:07:46 vmfsppjb006 kernel: Memory: 922868K/2096696K available (12292K kernel code, 2152K rwdata, 3852K rodata, 2408K init, 6468K bss, 324976K reserved, 0K cma-reserved)
Oct 27 09:07:46 vmfsppjb006 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Oct 27 09:07:46 vmfsppjb006 kernel: Kernel/User page tables isolation: enabled
Oct 27 09:07:46 vmfsppjb006 kernel: ftrace: allocating 36349 entries in 142 pages
Oct 27 09:07:46 vmfsppjb006 kernel: rcu: Hierarchical RCU implementation.
Oct 27 09:07:46 vmfsppjb006 kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=1.
Oct 27 09:07:46 vmfsppjb006 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct 27 09:07:46 vmfsppjb006 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
Oct 27 09:07:46 vmfsppjb006 kernel: NR_IRQS: 524544, nr_irqs: 256, preallocated irqs: 16
Oct 27 09:07:46 vmfsppjb006 kernel: random: get_random_bytes called from start_kernel+0x36b/0x55b with crng_init=0
Oct 27 09:07:46 vmfsppjb006 kernel: Console: colour VGA+ 80x25
Oct 27 09:07:46 vmfsppjb006 kernel: printk: console [tty1] enabled
Oct 27 09:07:46 vmfsppjb006 kernel: printk: console [ttyS0] enabled
Oct 27 09:07:46 vmfsppjb006 kernel: printk: bootconsole [earlyser0] disabled
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Core revision 20190703
Oct 27 09:07:46 vmfsppjb006 kernel: APIC: Switch to symmetric I/O mode setup
Oct 27 09:07:46 vmfsppjb006 kernel: Hyper-V: Using IPI hypercalls
Oct 27 09:07:46 vmfsppjb006 kernel: Hyper-V: Using MSR based APIC access
Oct 27 09:07:46 vmfsppjb006 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns
Oct 27 09:07:46 vmfsppjb006 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
Oct 27 09:07:46 vmfsppjb006 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905)
Oct 27 09:07:46 vmfsppjb006 kernel: pid_max: default: 32768 minimum: 301
Oct 27 09:07:46 vmfsppjb006 kernel: Security Framework initialized
Oct 27 09:07:46 vmfsppjb006 kernel: Yama: becoming mindful.
Oct 27 09:07:46 vmfsppjb006 kernel: SELinux:  Initializing.
Oct 27 09:07:46 vmfsppjb006 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Oct 27 09:07:46 vmfsppjb006 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Oct 27 09:07:46 vmfsppjb006 kernel: FEATURE SPEC_CTRL Not Present
Oct 27 09:07:46 vmfsppjb006 kernel: FEATURE IBPB_SUPPORT Not Present
Oct 27 09:07:46 vmfsppjb006 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct 27 09:07:46 vmfsppjb006 kernel: Spectre V2 : Mitigation: Full generic retpoline
Oct 27 09:07:46 vmfsppjb006 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct 27 09:07:46 vmfsppjb006 kernel: Speculative Store Bypass: Vulnerable
Oct 27 09:07:46 vmfsppjb006 kernel: TAA: Mitigation: Clear CPU buffers
Oct 27 09:07:46 vmfsppjb006 kernel: MDS: Mitigation: Clear CPU buffers
Oct 27 09:07:46 vmfsppjb006 kernel: Freeing SMP alternatives memory: 32K
Oct 27 09:07:46 vmfsppjb006 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7)
Oct 27 09:07:46 vmfsppjb006 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Oct 27 09:07:46 vmfsppjb006 kernel: rcu: Hierarchical SRCU implementation.
Oct 27 09:07:46 vmfsppjb006 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Oct 27 09:07:46 vmfsppjb006 kernel: smp: Bringing up secondary CPUs ...
Oct 27 09:07:46 vmfsppjb006 kernel: smp: Brought up 1 node, 1 CPU
Oct 27 09:07:46 vmfsppjb006 kernel: smpboot: Max logical packages: 1
Oct 27 09:07:46 vmfsppjb006 kernel: smpboot: Total of 1 processors activated (5187.81 BogoMIPS)
Oct 27 09:07:46 vmfsppjb006 kernel: node 0 initialised, 212213 pages in 1ms
Oct 27 09:07:46 vmfsppjb006 kernel: devtmpfs: initialized
Oct 27 09:07:46 vmfsppjb006 kernel: x86/mm: Memory block size: 128MB
Oct 27 09:07:46 vmfsppjb006 kernel: PM: Registering ACPI NVS region [mem 0x3ffff000-0x3fffffff] (4096 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct 27 09:07:46 vmfsppjb006 kernel: futex hash table entries: 256 (order: 2, 16384 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: pinctrl core: initialized pinctrl subsystem
Oct 27 09:07:46 vmfsppjb006 kernel: NET: Registered protocol family 16
Oct 27 09:07:46 vmfsppjb006 kernel: audit: initializing netlink subsys (disabled)
Oct 27 09:07:46 vmfsppjb006 kernel: cpuidle: using governor menu
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: bus type PCI registered
Oct 27 09:07:46 vmfsppjb006 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct 27 09:07:46 vmfsppjb006 kernel: PCI: Using configuration type 1 for base access
Oct 27 09:07:46 vmfsppjb006 kernel: audit: type=2000 audit(1635293263.106:1): state=initialized audit_enabled=0 res=1
Oct 27 09:07:46 vmfsppjb006 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct 27 09:07:46 vmfsppjb006 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct 27 09:07:46 vmfsppjb006 kernel: cryptd: max_cpu_qlen set to 1000
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Added _OSI(Module Device)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Device)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Interpreter enabled
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: (supports S0 S5)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Using IOAPIC for interrupt routing
Oct 27 09:07:46 vmfsppjb006 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Oct 27 09:07:46 vmfsppjb006 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Oct 27 09:07:46 vmfsppjb006 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Oct 27 09:07:46 vmfsppjb006 kernel: PCI host bridge to bus 0000:00
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0xfe0000000-0xfffffffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x40000000-0xfffbffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:00.0: [8086:7192] type 00 class 0x060000
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x010180
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.1: reg 0x20: [io  0xffa0-0xffaf]
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000
Oct 27 09:07:46 vmfsppjb006 kernel: * Found PM-Timer Bug on the chipset. Due to workarounds for a bug,#012* this clock source is slow. Consider trying other clock sources
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:07.3: quirk: [io  0x0400-0x043f] claimed by PIIX4 ACPI
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:08.0: [1414:5353] type 00 class 0x030000
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:08.0: reg 0x10: [mem 0xf8000000-0xfbffffff]
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 7 9 10 *11 12 14 15)
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 27 09:07:46 vmfsppjb006 kernel: iommu: Default domain type: Passthrough 
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: setting as boot VGA device
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: bridge control possible
Oct 27 09:07:46 vmfsppjb006 kernel: vgaarb: loaded
Oct 27 09:07:46 vmfsppjb006 kernel: SCSI subsystem initialized
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: bus type USB registered
Oct 27 09:07:46 vmfsppjb006 kernel: usbcore: registered new interface driver usbfs
Oct 27 09:07:46 vmfsppjb006 kernel: usbcore: registered new interface driver hub
Oct 27 09:07:46 vmfsppjb006 kernel: usbcore: registered new device driver usb
Oct 27 09:07:46 vmfsppjb006 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct 27 09:07:46 vmfsppjb006 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct 27 09:07:46 vmfsppjb006 kernel: PTP clock support registered
Oct 27 09:07:46 vmfsppjb006 kernel: EDAC MC: Ver: 3.0.0
Oct 27 09:07:46 vmfsppjb006 kernel: PCI: Using ACPI for IRQ routing
Oct 27 09:07:46 vmfsppjb006 kernel: NetLabel: Initializing
Oct 27 09:07:46 vmfsppjb006 kernel: NetLabel:  domain hash size = 128
Oct 27 09:07:46 vmfsppjb006 kernel: NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
Oct 27 09:07:46 vmfsppjb006 kernel: NetLabel:  unlabeled traffic allowed by default
Oct 27 09:07:46 vmfsppjb006 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page
Oct 27 09:07:46 vmfsppjb006 kernel: VFS: Disk quotas dquot_6.6.0
Oct 27 09:07:46 vmfsppjb006 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: pnp: PnP ACPI init
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:06: [io  0x01e0-0x01ef] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:06: [io  0x0160-0x016f] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:06: [io  0x0278-0x027f] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:06: [io  0x0378-0x037f] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:06: [io  0x0678-0x067f] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:06: [io  0x0778-0x077f] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:06: [io  0x04d0-0x04d1] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:07: [io  0x0400-0x043f] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:07: [io  0x0370-0x0371] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:07: [io  0x0440-0x044f] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:07: [mem 0xfec00000-0xfec00fff] could not be reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:07: [mem 0xfee00000-0xfee00fff] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:08: [mem 0x00000000-0x0009ffff] could not be reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:08: [mem 0x000c0000-0x000dffff] could not be reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:08: [mem 0x000e0000-0x000fffff] could not be reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:08: [mem 0x00100000-0x3fffffff] could not be reserved
Oct 27 09:07:46 vmfsppjb006 kernel: system 00:08: [mem 0xfffc0000-0xffffffff] has been reserved
Oct 27 09:07:46 vmfsppjb006 kernel: pnp: PnP ACPI: found 9 devices
Oct 27 09:07:46 vmfsppjb006 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: resource 4 [mem 0xfe0000000-0xfffffffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: resource 5 [io  0x0000-0x0cf7 window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: resource 6 [io  0x0d00-0xffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: resource 7 [mem 0x000a0000-0x000bffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: pci_bus 0000:00: resource 8 [mem 0x40000000-0xfffbffff window]
Oct 27 09:07:46 vmfsppjb006 kernel: NET: Registered protocol family 2
Oct 27 09:07:46 vmfsppjb006 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Oct 27 09:07:46 vmfsppjb006 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes)
Oct 27 09:07:46 vmfsppjb006 kernel: NET: Registered protocol family 1
Oct 27 09:07:46 vmfsppjb006 kernel: NET: Registered protocol family 44
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Oct 27 09:07:46 vmfsppjb006 kernel: pci 0000:00:08.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Oct 27 09:07:46 vmfsppjb006 kernel: PCI: CLS 0 bytes, default 64
Oct 27 09:07:46 vmfsppjb006 kernel: Unpacking initramfs...
Oct 27 09:07:46 vmfsppjb006 kernel: Freeing initrd memory: 26316K
Oct 27 09:07:46 vmfsppjb006 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Oct 27 09:07:46 vmfsppjb006 kernel: software IO TLB: mapped [mem 0x3bff0000-0x3fff0000] (64MB)
Oct 27 09:07:46 vmfsppjb006 kernel: Initialise system trusted keyrings
Oct 27 09:07:46 vmfsppjb006 kernel: Key type blacklist registered
Oct 27 09:07:46 vmfsppjb006 kernel: workingset: timestamp_bits=36 max_order=19 bucket_order=0
Oct 27 09:07:46 vmfsppjb006 kernel: zbud: loaded
Oct 27 09:07:46 vmfsppjb006 kernel: pstore: using deflate compression
Oct 27 09:07:46 vmfsppjb006 kernel: Platform Keyring initialized
Oct 27 09:07:46 vmfsppjb006 kernel: NET: Registered protocol family 38
Oct 27 09:07:46 vmfsppjb006 kernel: Key type asymmetric registered
Oct 27 09:07:46 vmfsppjb006 kernel: Asymmetric key parser 'x509' registered
Oct 27 09:07:46 vmfsppjb006 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246)
Oct 27 09:07:46 vmfsppjb006 kernel: io scheduler mq-deadline registered
Oct 27 09:07:46 vmfsppjb006 kernel: io scheduler kyber registered
Oct 27 09:07:46 vmfsppjb006 kernel: io scheduler bfq registered
Oct 27 09:07:46 vmfsppjb006 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE
Oct 27 09:07:46 vmfsppjb006 kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
Oct 27 09:07:46 vmfsppjb006 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
Oct 27 09:07:46 vmfsppjb006 kernel: ACPI: Power Button [PWRF]
Oct 27 09:07:46 vmfsppjb006 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct 27 09:07:46 vmfsppjb006 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct 27 09:07:46 vmfsppjb006 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Oct 27 09:07:46 vmfsppjb006 kernel: Non-volatile memory driver v1.3
Oct 27 09:07:46 vmfsppjb006 kernel: rdac: device handler registered
Oct 27 09:07:46 vmfsppjb006 kernel: hp_sw: device handler registered
Oct 27 09:07:46 vmfsppjb006 kernel: emc: device handler registered
Oct 27 09:07:46 vmfsppjb006 kernel: alua: device handler registered
Oct 27 09:07:46 vmfsppjb006 kernel: libphy: Fixed MDIO Bus: probed
Oct 27 09:07:46 vmfsppjb006 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Oct 27 09:07:46 vmfsppjb006 kernel: ehci-pci: EHCI PCI platform driver
Oct 27 09:07:46 vmfsppjb006 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Oct 27 09:07:46 vmfsppjb006 kernel: ohci-pci: OHCI PCI platform driver
Oct 27 09:07:46 vmfsppjb006 kernel: uhci_hcd: USB Universal Host Controller Interface driver
Oct 27 09:07:46 vmfsppjb006 kernel: usbcore: registered new interface driver usbserial_generic
Oct 27 09:07:46 vmfsppjb006 kernel: usbserial: USB Serial support registered for generic
Oct 27 09:07:46 vmfsppjb006 kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12
Oct 27 09:07:46 vmfsppjb006 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Oct 27 09:07:46 vmfsppjb006 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Oct 27 09:07:46 vmfsppjb006 kernel: mousedev: PS/2 mouse device common for all mice
Oct 27 09:07:46 vmfsppjb006 kernel: rtc_cmos 00:00: RTC can wake from S4
Oct 27 09:07:46 vmfsppjb006 kernel: rtc_cmos 00:00: registered as rtc0
Oct 27 09:07:46 vmfsppjb006 kernel: rtc_cmos 00:00: alarms up to one month, 114 bytes nvram
Oct 27 09:07:46 vmfsppjb006 kernel: intel_pstate: CPU model not supported
Oct 27 09:07:46 vmfsppjb006 kernel: hidraw: raw HID events driver (C) Jiri Kosina
Oct 27 09:07:46 vmfsppjb006 kernel: usbcore: registered new interface driver usbhid
Oct 27 09:07:46 vmfsppjb006 kernel: usbhid: USB HID core driver
Oct 27 09:07:46 vmfsppjb006 kernel: drop_monitor: Initializing network drop monitor service
Oct 27 09:07:46 vmfsppjb006 kernel: Initializing XFRM netlink socket
Oct 27 09:07:46 vmfsppjb006 kernel: NET: Registered protocol family 10
Oct 27 09:07:46 vmfsppjb006 kernel: Segment Routing with IPv6
Oct 27 09:07:46 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1
Oct 27 09:07:46 vmfsppjb006 kernel: NET: Registered protocol family 17
Oct 27 09:07:46 vmfsppjb006 kernel: mpls_gso: MPLS GSO support
Oct 27 09:07:46 vmfsppjb006 kernel: core: Using 1 MCE banks
Oct 27 09:07:46 vmfsppjb006 kernel: AVX2 version of gcm_enc/dec engaged.
Oct 27 09:07:46 vmfsppjb006 kernel: AES CTR mode by8 optimization enabled
Oct 27 09:07:46 vmfsppjb006 kernel: registered taskstats version 1
Oct 27 09:07:46 vmfsppjb006 kernel: Loading compiled-in X.509 certificates
Oct 27 09:07:46 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 6510a14606da3bfa607738428a62729c5d677293'
Oct 27 09:07:46 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80'
Oct 27 09:07:46 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8'
Oct 27 09:07:46 vmfsppjb006 kernel: zswap: loaded using pool lzo/zbud
Oct 27 09:07:46 vmfsppjb006 kernel: Key type big_key registered
Oct 27 09:07:46 vmfsppjb006 kernel: Key type encrypted registered
Oct 27 09:07:46 vmfsppjb006 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct 27 09:07:46 vmfsppjb006 kernel: ima: Allocated hash algorithm: sha1
Oct 27 09:07:46 vmfsppjb006 kernel: evm: Initialising EVM extended attributes:
Oct 27 09:07:46 vmfsppjb006 kernel: evm: security.selinux
Oct 27 09:07:46 vmfsppjb006 kernel: evm: security.ima
Oct 27 09:07:46 vmfsppjb006 kernel: evm: security.capability
Oct 27 09:07:46 vmfsppjb006 kernel: evm: HMAC attrs: 0x1
Oct 27 09:07:46 vmfsppjb006 kernel: rtc_cmos 00:00: setting system clock to 2021-10-27 00:07:45 UTC (1635293265)
Oct 27 09:07:46 vmfsppjb006 kernel: Unstable clock detected, switching default tracing clock to "global"#012If you want to keep using the local clock, then add:#012  "trace_clock=local"#012on the kernel command line
Oct 27 09:07:46 vmfsppjb006 kernel: Freeing unused decrypted memory: 2040K
Oct 27 09:07:46 vmfsppjb006 kernel: Freeing unused kernel memory: 2408K
Oct 27 09:07:46 vmfsppjb006 kernel: Write protecting the kernel read-only data: 18432k
Oct 27 09:07:46 vmfsppjb006 kernel: Freeing unused kernel memory: 2020K
Oct 27 09:07:46 vmfsppjb006 kernel: Freeing unused kernel memory: 244K
Oct 27 09:07:46 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Running in initial RAM disk.
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Set hostname to <pkrvmlk3jhumuhr>.
Oct 27 09:07:46 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Listening on udev Kernel Socket.
Oct 27 09:07:46 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Listening on Journal Socket (/dev/log).
Oct 27 09:07:46 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Reached target Local File Systems.
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Listening on Journal Socket.
Oct 27 09:07:46 vmfsppjb006 systemd[1]: Starting Create list of required static device nodes for the current kernel...
Oct 27 09:07:46 vmfsppjb006 kernel: psmouse serio1: trackpoint: failed to get extended button data, assuming 3 buttons
Oct 27 09:07:46 vmfsppjb006 systemd-journald[262]: Journal started
Oct 27 09:07:46 vmfsppjb006 systemd-journald[262]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 27 09:07:46 vmfsppjb006 rngd[263]: Initializing available sources
Oct 27 09:07:46 vmfsppjb006 rngd[263]: Failed to init entropy source hwrng
Oct 27 09:07:46 vmfsppjb006 rngd[263]: Enabling RDSEED rng support
Oct 27 09:07:46 vmfsppjb006 rngd[263]: Initializing entropy source rdrand
Oct 27 09:07:47 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 27 09:07:47 vmfsppjb006 systemd[1]: Started Apply Kernel Variables.
Oct 27 09:07:47 vmfsppjb006 systemd[1]: Starting Create Static Device Nodes in /dev...
Oct 27 09:07:47 vmfsppjb006 systemd[1]: Started Create Static Device Nodes in /dev.
Oct 27 09:07:47 vmfsppjb006 kernel: random: fast init done
Oct 27 09:07:48 vmfsppjb006 systemd[1]: Started Setup Virtual Console.
Oct 27 09:07:48 vmfsppjb006 systemd[1]: Starting dracut cmdline hook...
Oct 27 09:07:48 vmfsppjb006 dracut-cmdline[279]: dracut-8.2 (Ootpa) dracut-049-70.git20200228.el8
Oct 27 09:07:48 vmfsppjb006 dracut-cmdline[279]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 27 09:07:48 vmfsppjb006 systemd[1]: Started dracut cmdline hook.
Oct 27 09:07:48 vmfsppjb006 systemd[1]: Starting dracut pre-udev hook...
Oct 27 09:07:48 vmfsppjb006 kernel: device-mapper: uevent: version 1.0.3
Oct 27 09:07:48 vmfsppjb006 kernel: device-mapper: ioctl: 4.39.0-ioctl (2018-04-03) initialised: dm-devel@redhat.com
Oct 27 09:07:48 vmfsppjb006 systemd[1]: Started dracut pre-udev hook.
Oct 27 09:07:48 vmfsppjb006 systemd[1]: Starting udev Kernel Device Manager...
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Starting udev Coldplug all Devices...
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Mounting Kernel Configuration File System...
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Mounted Kernel Configuration File System.
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Started udev Coldplug all Devices.
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Starting dracut initqueue hook...
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 27 09:07:49 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 27 09:07:49 vmfsppjb006 kernel: psmouse serio1: trackpoint: IBM TrackPoint firmware: 0x01, buttons: 3/3
Oct 27 09:07:49 vmfsppjb006 kernel: input: TPPS/2 IBM TrackPoint as /devices/platform/i8042/serio1/input/input3
Oct 27 09:07:49 vmfsppjb006 kernel: hv_vmbus: Vmbus version:4.0
Oct 27 09:07:49 vmfsppjb006 systemd-udevd[416]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 27 09:07:49 vmfsppjb006 kernel: hv_vmbus: Unknown GUID: c376c1c3-d276-48d2-90a9-c04748072c60
Oct 27 09:07:49 vmfsppjb006 kernel: hv_vmbus: registering driver hid_hyperv
Oct 27 09:07:49 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_keyboard
Oct 27 09:07:49 vmfsppjb006 kernel: hv_vmbus: registering driver hv_storvsc
Oct 27 09:07:49 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:07/VMBUS:01/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio2/input/input4
Oct 27 09:07:49 vmfsppjb006 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input5
Oct 27 09:07:49 vmfsppjb006 kernel: ata_piix 0000:00:07.1: Hyper-V Virtual Machine detected, ATA device ignore set
Oct 27 09:07:49 vmfsppjb006 kernel: hid-generic 0006:045E:0621.0001: input: <UNKNOWN> HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on 
Oct 27 09:07:49 vmfsppjb006 kernel: scsi host0: storvsc_host_t
Oct 27 09:07:49 vmfsppjb006 kernel: scsi 0:0:0:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 27 09:07:49 vmfsppjb006 kernel: scsi host1: storvsc_host_t
Oct 27 09:07:49 vmfsppjb006 kernel: scsi host3: storvsc_host_t
Oct 27 09:07:49 vmfsppjb006 kernel: scsi host2: storvsc_host_t
Oct 27 09:07:49 vmfsppjb006 kernel: scsi 1:0:1:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 27 09:07:49 vmfsppjb006 kernel: hv_vmbus: registering driver hv_netvsc
Oct 27 09:07:49 vmfsppjb006 kernel: scsi host4: ata_piix
Oct 27 09:07:49 vmfsppjb006 kernel: scsi host5: ata_piix
Oct 27 09:07:49 vmfsppjb006 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0xffa0 irq 14
Oct 27 09:07:49 vmfsppjb006 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0xffa8 irq 15
Oct 27 09:07:49 vmfsppjb006 systemd-udevd[418]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 27 09:07:49 vmfsppjb006 kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 0
Oct 27 09:07:49 vmfsppjb006 kernel: scsi 1:0:1:0: Attached scsi generic sg1 type 0
Oct 27 09:07:49 vmfsppjb006 kernel: sd 0:0:0:0: [sda] 134217728 512-byte logical blocks: (68.7 GB/64.0 GiB)
Oct 27 09:07:49 vmfsppjb006 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Oct 27 09:07:49 vmfsppjb006 kernel: sd 0:0:0:0: [sda] Write Protect is off
Oct 27 09:07:49 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] 8388608 512-byte logical blocks: (4.29 GB/4.00 GiB)
Oct 27 09:07:49 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] 4096-byte physical blocks
Oct 27 09:07:49 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] Write Protect is off
Oct 27 09:07:49 vmfsppjb006 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA
Oct 27 09:07:49 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] Write cache: disabled, read cache: enabled, supports DPO and FUA
Oct 27 09:07:49 vmfsppjb006 kernel: sdb: sdb1
Oct 27 09:07:49 vmfsppjb006 kernel: sd 1:0:1:0: [sdb] Attached SCSI disk
Oct 27 09:07:49 vmfsppjb006 kernel: sda: sda1 sda2 sda14 sda15
Oct 27 09:07:49 vmfsppjb006 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Oct 27 09:07:50 vmfsppjb006 rngd[263]: Initializing AES buffer
Oct 27 09:07:50 vmfsppjb006 rngd[263]: Enabling JITTER rng support
Oct 27 09:07:51 vmfsppjb006 dracut-initqueue[423]: Scanning devices sda2  for LVM volume groups
Oct 27 09:07:51 vmfsppjb006 dracut-initqueue[423]: Found volume group "rootvg" using metadata type lvm2
Oct 27 09:07:51 vmfsppjb006 kernel: random: crng init done
Oct 27 09:07:51 vmfsppjb006 kernel: random: 7 urandom warning(s) missed due to ratelimiting
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Found device /dev/mapper/rootvg-rootlv.
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Reached target Initrd Root Device.
Oct 27 09:07:52 vmfsppjb006 dracut-initqueue[423]: 5 logical volume(s) in volume group "rootvg" now active
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Started dracut initqueue hook.
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Reached target Remote File Systems (Pre).
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Reached target Remote File Systems.
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Starting File System Check on /dev/mapper/rootvg-rootlv...
Oct 27 09:07:52 vmfsppjb006 systemd-fsck[554]: /usr/sbin/fsck.xfs: XFS file system.
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Started File System Check on /dev/mapper/rootvg-rootlv.
Oct 27 09:07:52 vmfsppjb006 systemd[1]: Mounting /sysroot...
Oct 27 09:07:52 vmfsppjb006 kernel: SGI XFS with ACLs, security attributes, no debug enabled
Oct 27 09:07:52 vmfsppjb006 kernel: XFS (dm-4): Mounting V5 Filesystem
Oct 27 09:07:52 vmfsppjb006 rngd[263]: Initializing entropy source jitter
Oct 27 09:07:53 vmfsppjb006 kernel: XFS (dm-4): Ending clean mount
Oct 27 09:07:53 vmfsppjb006 systemd[1]: Mounted /sysroot.
Oct 27 09:07:53 vmfsppjb006 systemd[1]: Reached target Initrd Root File System.
Oct 27 09:07:53 vmfsppjb006 systemd[1]: Starting Reload Configuration from the Real Root...
Oct 27 09:07:53 vmfsppjb006 systemd[1]: Reloading.
Oct 27 09:07:53 vmfsppjb006 systemd[1]: Mounting /sysroot/usr...
Oct 27 09:07:53 vmfsppjb006 systemd[1]: Started Reload Configuration from the Real Root.
Oct 27 09:07:53 vmfsppjb006 kernel: XFS (dm-1): Mounting V5 Filesystem
Oct 27 09:07:54 vmfsppjb006 kernel: XFS (dm-1): Ending clean mount
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Mounted /sysroot/usr.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Reached target Initrd File Systems.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Reached target Initrd Default Target.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Starting dracut pre-pivot and cleanup hook...
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Started dracut pre-pivot and cleanup hook.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Starting Cleaning Up and Shutting Down Daemons...
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Timers.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped dracut pre-pivot and cleanup hook.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Initrd Default Target.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Basic System.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Paths.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target System Initialization.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Swap.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped Create Volatile Files and Directories.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped Apply Kernel Variables.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Local File Systems.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopping udev Kernel Device Manager...
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Slices.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Remote File Systems.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Remote File Systems (Pre).
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped dracut initqueue hook.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Sockets.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped target Initrd Root Device.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped udev Coldplug all Devices.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped udev Kernel Device Manager.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Started Cleaning Up and Shutting Down Daemons.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon...
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped dracut pre-udev hook.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped dracut cmdline hook.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped Create Static Device Nodes in /dev.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped Create list of required static device nodes for the current kernel.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Closed udev Kernel Socket.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Closed udev Control Socket.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Starting Cleanup udevd DB...
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Started Cleanup udevd DB.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Reached target Switch Root.
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Starting Switch Root...
Oct 27 09:07:54 vmfsppjb006 systemd[1]: Switching root.
Oct 27 09:07:54 vmfsppjb006 systemd-journald[262]: Journal stopped
Oct 27 09:07:58 vmfsppjb006 systemd-journald[262]: Received SIGTERM from PID 1 (systemd).
Oct 27 09:07:58 vmfsppjb006 kernel: printk: systemd: 14 output lines suppressed due to ratelimiting
Oct 27 09:07:58 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 27 09:07:58 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 27 09:07:58 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 27 09:07:58 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 27 09:07:58 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 27 09:07:58 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 27 09:07:58 vmfsppjb006 kernel: audit: type=1403 audit(1635293276.132:2): auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Successfully loaded SELinux policy in 1.030036s.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Relabelled /dev, /run and /sys/fs/cgroup in 20.601ms.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Set hostname to <vmfsppjb006>.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Stopped Switch Root.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: systemd-journald.service: Service has no hold-off time (RestartSec=0), scheduling restart.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Stopped Journal Service.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Starting Journal Service...
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network...
Oct 27 09:07:58 vmfsppjb006 systemd-journald[689]: Journal started
Oct 27 09:07:58 vmfsppjb006 systemd-journald[689]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 27 09:07:58 vmfsppjb006 systemd[694]: systemd-resolved.service: Failed at step NAMESPACE spawning /usr/lib/systemd/systemd-resolved: Read-only file system
Oct 27 09:07:58 vmfsppjb006 systemd-tmpfiles[713]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 27 09:07:58 vmfsppjb006 systemd-tmpfiles[713]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 27 09:07:58 vmfsppjb006 systemd-resolved[712]: Positive Trust Anchors:
Oct 27 09:07:58 vmfsppjb006 systemd-resolved[712]: . IN DS 19036 8 2 49aac11d7b6f6446702e54a1607371607a1a41855200fd2ce1cdde32f24e8fb5
Oct 27 09:07:58 vmfsppjb006 systemd-resolved[712]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct 27 09:07:58 vmfsppjb006 systemd-resolved[712]: Negative trust anchors: 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct 27 09:07:58 vmfsppjb006 systemd-resolved[712]: Using system hostname 'vmfsppjb006'.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Started Network Name Resolution.
Oct 27 09:07:58 vmfsppjb006 systemd[1]: Reached target Host and Network Name Lookups.
Oct 27 09:07:58 vmfsppjb006 kernel: piix4_smbus 0000:00:07.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr
Oct 27 09:07:58 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_fb
Oct 27 09:07:58 vmfsppjb006 kernel: hyperv_fb: Screen resolution: 1152x864, Color depth: 32
Oct 27 09:07:58 vmfsppjb006 kernel: Console: switching to colour frame buffer device 144x54
Oct 27 09:07:58 vmfsppjb006 kernel: hv_vmbus: registering driver hv_balloon
Oct 27 09:07:58 vmfsppjb006 kernel: hv_utils: Registering HyperV Utility Driver
Oct 27 09:07:58 vmfsppjb006 kernel: hv_vmbus: registering driver hv_utils
Oct 27 09:07:58 vmfsppjb006 kernel: hv_utils: Heartbeat IC version 3.0
Oct 27 09:07:58 vmfsppjb006 kernel: hv_utils: Shutdown IC version 3.0
Oct 27 09:07:58 vmfsppjb006 kernel: hv_utils: TimeSync IC version 4.0
Oct 27 09:07:59 vmfsppjb006 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0
Oct 27 09:07:59 vmfsppjb006 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6
Oct 27 09:07:59 vmfsppjb006 systemd-udevd[717]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 27 09:07:59 vmfsppjb006 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Oct 27 09:07:59 vmfsppjb006 systemd-udevd[720]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Found device Virtual_Disk Temporary_Storage.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Created slice system-lvm2\x2dpvscan.slice.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Starting LVM event activation on device 8:2...
Oct 27 09:07:59 vmfsppjb006 lvm[706]:  5 logical volume(s) in volume group "rootvg" monitored
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Reached target Local File Systems (Pre).
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Mounting /var...
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Mounting /boot...
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Mounting /tmp...
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/by-uuid/F405-5B51...
Oct 27 09:07:59 vmfsppjb006 lvm[768]:  pvscan[768] PV /dev/sda2 online, VG rootvg is complete.
Oct 27 09:07:59 vmfsppjb006 lvm[768]:  pvscan[768] VG rootvg run autoactivation.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Mounting /home...
Oct 27 09:07:59 vmfsppjb006 lvm[768]:  5 logical volume(s) in volume group "rootvg" now active
Oct 27 09:07:59 vmfsppjb006 systemd-fsck[775]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 27 09:07:59 vmfsppjb006 kernel: XFS (dm-3): Mounting V5 Filesystem
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Started LVM event activation on device 8:2.
Oct 27 09:07:59 vmfsppjb006 kernel: XFS (sda1): Mounting V5 Filesystem
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 27 09:07:59 vmfsppjb006 kernel: XFS (dm-0): Mounting V5 Filesystem
Oct 27 09:07:59 vmfsppjb006 kernel: XFS (dm-2): Mounting V5 Filesystem
Oct 27 09:07:59 vmfsppjb006 systemd-fsck[782]: fsck.fat 4.1 (2017-01-24)
Oct 27 09:07:59 vmfsppjb006 systemd-fsck[782]: /dev/sda15: 13 files, 883/63325 clusters
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/by-uuid/F405-5B51.
Oct 27 09:07:59 vmfsppjb006 kernel: XFS (dm-3): Ending clean mount
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Mounted /var.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Starting Flush Journal to Persistent Storage...
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Starting Load/Save Random Seed...
Oct 27 09:07:59 vmfsppjb006 systemd-journald[689]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Started Load/Save Random Seed.
Oct 27 09:07:59 vmfsppjb006 systemd[1]: Started Flush Journal to Persistent Storage.
Oct 27 09:07:59 vmfsppjb006 kernel: XFS (dm-2): Ending clean mount
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Mounted /home.
Oct 27 09:08:00 vmfsppjb006 kernel: XFS (dm-0): Ending clean mount
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Mounted /tmp.
Oct 27 09:08:00 vmfsppjb006 kernel: XFS (sda1): Ending clean mount
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Mounted /boot.
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Mounting /boot/efi...
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Mounted /boot/efi.
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Reached target Local File Systems.
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Starting Restore /run/initramfs on shutdown...
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Starting Import network configuration from initramfs...
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Started Restore /run/initramfs on shutdown.
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Started Import network configuration from initramfs.
Oct 27 09:08:00 vmfsppjb006 systemd[1]: Starting Create Volatile Files and Directories...
Oct 27 09:08:01 vmfsppjb006 systemd-tmpfiles[851]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 27 09:08:01 vmfsppjb006 systemd-tmpfiles[851]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Starting Security Auditing Service...
Oct 27 09:08:01 vmfsppjb006 auditd[854]: audit dispatcher initialized with q_depth=400 and 1 active plugins
Oct 27 09:08:01 vmfsppjb006 auditd[854]: Init complete, auditd 3.0 listening for events (startup state enable)
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: /sbin/augenrules: No change
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: No rules
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: enabled 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: failure 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: pid 854
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: rate_limit 0
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog_limit 8192
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: lost 0
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog_wait_time 60000
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: enabled 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: failure 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: pid 854
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: rate_limit 0
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog_limit 8192
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: lost 0
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog_wait_time 60000
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: enabled 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: failure 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: pid 854
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: rate_limit 0
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog_limit 8192
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: lost 0
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog 1
Oct 27 09:08:01 vmfsppjb006 augenrules[859]: backlog_wait_time 60000
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started Security Auditing Service.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Starting Update UTMP about System Boot/Shutdown...
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started Update UTMP about System Boot/Shutdown.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started dnf makecache --timer.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started Daily Cleanup of Temporary Directories.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started daily update of the root trust anchor for DNSSEC.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Reached target Timers.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Listening on D-Bus System Message Bus Socket.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (pre-networking)...
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Reached target Sockets.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started libstoragemgmt plug-in server daemon.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Starting Hardware RNG Entropy Gatherer Wake threshold service...
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Starting Netfilter Tables...
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started Machine Check Exception Logging Daemon.
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Starting VDO volume services...
Oct 27 09:08:01 vmfsppjb006 systemd[1]: Started D-Bus System Message Bus.
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started Self Monitoring and Reporting Technology (SMART) Daemon.
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Reached target sshd-keygen.target.
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started irqbalance daemon.
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Starting NTP client/server...
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Starting System Security Services Daemon...
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Starting Authorization Manager...
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Wake threshold service.
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Starting update of the root trust anchor for DNSSEC validation in unbound...
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon.
Oct 27 09:08:02 vmfsppjb006 /usr/sbin/irqbalance[890]: Balancing is ineffective on systems with a single cpu.  Shutting down
Oct 27 09:08:02 vmfsppjb006 chronyd[902]: chronyd version 3.5 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 +DEBUG)
Oct 27 09:08:02 vmfsppjb006 chronyd[902]: Frequency -19.660 +/- 0.106 ppm read from /var/lib/chrony/drift
Oct 27 09:08:02 vmfsppjb006 chronyd[902]: Using right/UTC timezone to obtain leap second data
Oct 27 09:08:02 vmfsppjb006 smartd[889]: smartd 6.6 2017-11-05 r4594 [x86_64-linux-4.18.0-193.47.1.el8_2.x86_64] (local build)
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Copyright (C) 2002-17, Bruce Allen, Christian Franke, www.smartmontools.org
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Opened configuration file /etc/smartmontools/smartd.conf
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Device: /dev/sda, opened
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Device: /dev/sda, [Msft     Virtual Disk     1.0 ], lu id: 0x600224809c49d3a7764b86f8bc8c4cd0, 68.7 GB
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Device: /dev/sdb, opened
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Device: /dev/sdb, [Msft     Virtual Disk     1.0 ], lu id: 0x600224803605dcf48d0f7203189aa3c8, 4.29 GB
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Device: /dev/sdb, Bad IEC (SMART) mode page, err=5, skip device
Oct 27 09:08:02 vmfsppjb006 smartd[889]: Monitoring 0 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices
Oct 27 09:08:02 vmfsppjb006 systemd-resolved[712]: request_name_destroy_callback n_ref=1
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started Netfilter Tables.
Oct 27 09:08:02 vmfsppjb006 polkitd[894]: Started polkitd version 0.115
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started NTP client/server.
Oct 27 09:08:02 vmfsppjb006 rngd[897]: Initializing available sources
Oct 27 09:08:02 vmfsppjb006 rngd[897]: Failed to init entropy source hwrng
Oct 27 09:08:02 vmfsppjb006 rngd[897]: Enabling RDSEED rng support
Oct 27 09:08:02 vmfsppjb006 rngd[897]: Initializing entropy source rdrand
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started update of the root trust anchor for DNSSEC validation in unbound.
Oct 27 09:08:02 vmfsppjb006 sssd[893]: Starting up
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Started Authorization Manager.
Oct 27 09:08:02 vmfsppjb006 systemd[1]: Starting firewalld - dynamic firewall daemon...
Oct 27 09:08:02 vmfsppjb006 sssd[be[implicit_files]][921]: Starting up
Oct 27 09:08:03 vmfsppjb006 sssd[nss][924]: Starting up
Oct 27 09:08:03 vmfsppjb006 systemd[1]: Started VDO volume services.
Oct 27 09:08:03 vmfsppjb006 systemd[1]: Started System Security Services Daemon.
Oct 27 09:08:03 vmfsppjb006 systemd[1]: Reached target User and Group Name Lookups.
Oct 27 09:08:03 vmfsppjb006 systemd[1]: Starting Login Service...
Oct 27 09:08:04 vmfsppjb006 systemd-logind[931]: New seat seat0.
Oct 27 09:08:04 vmfsppjb006 systemd-logind[931]: Watching system buttons on /dev/input/event0 (Power Button)
Oct 27 09:08:04 vmfsppjb006 systemd-logind[931]: Watching system buttons on /dev/input/event4 (AT Translated Set 2 keyboard)
Oct 27 09:08:04 vmfsppjb006 systemd-logind[931]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard)
Oct 27 09:08:04 vmfsppjb006 systemd[1]: Started Login Service.
Oct 27 09:08:04 vmfsppjb006 systemd[1]: Started firewalld - dynamic firewall daemon.
Oct 27 09:08:04 vmfsppjb006 firewalld[923]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future release. Please consider disabling it now.
Oct 27 09:08:05 vmfsppjb006 cloud-init[911]: Cloud-init v. 19.4 running 'init-local' at Wed, 27 Oct 2021 00:08:04 +0000. Up 20.45 seconds.
Oct 27 09:08:05 vmfsppjb006 systemd[1]: Started Initial cloud-init job (pre-networking).
Oct 27 09:08:05 vmfsppjb006 systemd[1]: Reached target Network (Pre).
Oct 27 09:08:05 vmfsppjb006 systemd[1]: Starting Network Manager...
Oct 27 09:08:05 vmfsppjb006 NetworkManager[1042]: <info>  [1635293285.8202] NetworkManager (version 1.22.8-7.el8_2) is starting... (for the first time)
Oct 27 09:08:05 vmfsppjb006 NetworkManager[1042]: <info>  [1635293285.8209] Read config: /etc/NetworkManager/NetworkManager.conf
Oct 27 09:08:05 vmfsppjb006 systemd[1]: Started Network Manager.
Oct 27 09:08:05 vmfsppjb006 systemd[1]: Starting Network Manager Wait Online...
Oct 27 09:08:05 vmfsppjb006 systemd[1]: Reached target Network.
Oct 27 09:08:05 vmfsppjb006 NetworkManager[1042]: <info>  [1635293285.9150] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager"
Oct 27 09:08:05 vmfsppjb006 NetworkManager[1042]: <info>  [1635293285.9200] manager[0x55b9053fe090]: monitoring kernel firmware directory '/lib/firmware'.
Oct 27 09:08:05 vmfsppjb006 dbus-daemon[888]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.10' (uid=0 pid=1042 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 27 09:08:05 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting The Apache HTTP Server...
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting Dynamic System Tuning Daemon...
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting Enable periodic update of entitlement certificates....
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Started Hyper-V KVP daemon.
Oct 27 09:08:06 vmfsppjb006 KVP[1061]: KVP starting; pid is:1061
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting The PHP FastCGI Process Manager...
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting Jobarranger Agent...
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting MySQL Server...
Oct 27 09:08:06 vmfsppjb006 KVP[1061]: KVP LIC Version: 3.1
Oct 27 09:08:06 vmfsppjb006 kernel: hv_utils: KVP IC version 4.0
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Started Enable periodic update of entitlement certificates..
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Starting Hostname Service...
Oct 27 09:08:06 vmfsppjb006 systemd[1]: jobarg-agentd.service: Can't open PID file /run/jobarranger/jobarg_agentd.pid (yet?) after start: No such file or directory
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Started Jobarranger Agent.
Oct 27 09:08:06 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 27 09:08:06 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 27 09:08:07 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.freedesktop.hostname1'
Oct 27 09:08:07 vmfsppjb006 systemd[1]: Started Hostname Service.
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5031] hostname: hostname: using hostnamed
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5032] hostname: hostname changed from (none) to "vmfsppjb006"
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5036] dns-mgr[0x55b9053e3250]: init: dns=default,systemd-resolved rc-manager=symlink
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5147] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-device-plugin-team.so)
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5152] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5161] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5165] manager: Networking is enabled by state file
Oct 27 09:08:07 vmfsppjb006 dbus-daemon[888]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.10' (uid=0 pid=1042 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 27 09:08:07 vmfsppjb006 systemd[1]: Starting Network Manager Script Dispatcher Service...
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5228] dhcp-init: Using DHCP client 'dhclient'
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5378] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-settings-plugin-ifcfg-rh.so")
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5379] settings: Loaded settings plugin: keyfile (internal)
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5444] device (lo): carrier: link connected
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5483] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5604] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2)
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.5705] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external')
Oct 27 09:08:07 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 27 09:08:07 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Oct 27 09:08:07 vmfsppjb006 systemd[1]: Started Network Manager Script Dispatcher Service.
Oct 27 09:08:07 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 27 09:08:07 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct 27 09:08:07 vmfsppjb006 httpd[1058]: AH00558: httpd: Could not reliably determine the server's fully qualified domain name, using ::1. Set the 'ServerName' directive globally to suppress this message
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.6550] device (eth0): carrier: link connected
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.7099] device (eth0): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed')
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.7245] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.7350] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.7365] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed')
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.7419] manager: NetworkManager state is now CONNECTING
Oct 27 09:08:07 vmfsppjb006 NetworkManager[1042]: <info>  [1635293287.7457] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed')
Oct 27 09:08:07 vmfsppjb006 systemd[1]: Started The Apache HTTP Server.
Oct 27 09:08:07 vmfsppjb006 httpd[1058]: Server configured, listening on: port 80
Oct 27 09:08:07 vmfsppjb006 systemd[1]: Started Dynamic System Tuning Daemon.
Oct 27 09:08:08 vmfsppjb006 NetworkManager[1042]: <info>  [1635293288.2908] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed')
Oct 27 09:08:08 vmfsppjb006 NetworkManager[1042]: <info>  [1635293288.2914] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds)
Oct 27 09:08:08 vmfsppjb006 NetworkManager[1042]: <info>  [1635293288.3856] dhcp4 (eth0): dhclient started with pid 1499
Oct 27 09:08:08 vmfsppjb006 rngd[897]: Initializing AES buffer
Oct 27 09:08:08 vmfsppjb006 rngd[897]: Enabling JITTER rng support
Oct 27 09:08:09 vmfsppjb006 systemd[1]: Started The PHP FastCGI Process Manager.
Oct 27 09:08:09 vmfsppjb006 dhclient[1499]: DHCPREQUEST on eth0 to 255.255.255.255 port 67 (xid=0x4ab3f145)
Oct 27 09:08:09 vmfsppjb006 dhclient[1499]: DHCPACK from 168.63.129.16 (xid=0x4ab3f145)
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4107] dhcp4 (eth0):   address 10.30.70.10
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0):   plen 27 (255.255.255.224)
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0):   classless static route 168.63.129.16/32 gw 10.30.70.1
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0):   classless static route 169.254.169.254/32 gw 10.30.70.1
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0):   gateway 10.30.70.1
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0):   lease time 4294967295
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0):   nameserver '168.63.129.16'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0):   domain name 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4108] dhcp4 (eth0): option broadcast_address    => '10.30.70.31'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option dad_wait_time        => '0'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option dhcp_lease_time      => '4294967295'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option dhcp_message_type    => '5'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option dhcp_rebinding_time  => '4294967295'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option dhcp_renewal_time    => '4294967295'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option dhcp_server_identifier => '168.63.129.16'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option domain_name          => 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option domain_name_servers  => '168.63.129.16'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option expiry               => '5930260584'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option ip_address           => '10.30.70.10'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option network_number       => '10.30.70.0'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option next_server          => '168.63.129.16'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option private_245          => 'a8:3f:81:10'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4109] dhcp4 (eth0): option requested_broadcast_address => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_classless_static_routes => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_domain_name => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_domain_name_servers => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_domain_search => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_host_name  => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_interface_mtu => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_ms_classless_static_routes => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_nis_domain => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_nis_servers => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_ntp_servers => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_rfc3442_classless_static_routes => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_root_path  => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_routers    => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_static_routes => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_subnet_mask => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4110] dhcp4 (eth0): option requested_time_offset => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4111] dhcp4 (eth0): option requested_wpad       => '1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4111] dhcp4 (eth0): option rfc3442_classless_static_routes => '0 10 30 70 1 32 168 63 129 16 10 30 70 1 32 169 254 169 254 10 30 70 1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4111] dhcp4 (eth0): option routers              => '10.30.70.1'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4111] dhcp4 (eth0): option server_name          => 'TYO221050613049'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4111] dhcp4 (eth0): option subnet_mask          => '255.255.255.224'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4111] dhcp4 (eth0): option unknown_245          => 'a8:3f:81:10'
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4111] dhcp4 (eth0): state changed unknown -> extended
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4119] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed')
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4187] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed')
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4188] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed')
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4192] manager: NetworkManager state is now CONNECTED_LOCAL
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4198] manager: NetworkManager state is now CONNECTED_SITE
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.4199] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.6055] device (eth0): Activation: successful, device activated.
Oct 27 09:08:09 vmfsppjb006 dhclient[1499]: Timeout too large reducing to: 2147483646 (TIME_MAX - 1)
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.6061] manager: NetworkManager state is now CONNECTED_GLOBAL
Oct 27 09:08:09 vmfsppjb006 dhclient[1499]: bound to 10.30.70.10 -- renewal in 4294967295 seconds.
Oct 27 09:08:09 vmfsppjb006 NetworkManager[1042]: <info>  [1635293289.6064] manager: startup complete
Oct 27 09:08:09 vmfsppjb006 systemd[1]: Started Network Manager Wait Online.
Oct 27 09:08:09 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (metadata service crawler)...
Oct 27 09:08:11 vmfsppjb006 rngd[897]: Initializing entropy source jitter
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: Cloud-init v. 19.4 running 'init' at Wed, 27 Oct 2021 00:08:10 +0000. Up 26.49 seconds.
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info++++++++++++++++++++++++++++++++++++++++
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: | Device |  Up  |           Address           |       Mask      | Scope  |     Hw-Address    |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |  eth0  | True |         10.30.70.10         | 255.255.255.224 | global | 00:22:48:68:76:f6 |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |  eth0  | True | fe80::222:48ff:fe68:76f6/64 |        .        |  link  | 00:22:48:68:76:f6 |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   lo   | True |          127.0.0.1          |    255.0.0.0    |  host  |         .         |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   lo   | True |           ::1/128           |        .        |  host  |         .         |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +++++++++++++++++++++++++++++++Route IPv4 info++++++++++++++++++++++++++++++++
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: | Route |   Destination   |  Gateway   |     Genmask     | Interface | Flags |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   0   |     0.0.0.0     | 10.30.70.1 |     0.0.0.0     |    eth0   |   UG  |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   1   |    10.30.70.0   |  0.0.0.0   | 255.255.255.224 |    eth0   |   U   |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   2   |  168.63.129.16  | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   3   | 169.254.169.254 | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: | Route | Destination | Gateway | Interface | Flags |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   1   |  fe80::/64  |    ::   |    eth0   |   U   |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   3   |    local    |    ::   |    eth0   |   U   |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: |   4   |   ff00::/8  |    ::   |    eth0   |   U   |
Oct 27 09:08:11 vmfsppjb006 cloud-init[1519]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 27 09:08:13 vmfsppjb006 kernel: sdb: sdb1
Oct 27 09:08:13 vmfsppjb006 systemd[1]: Stopped File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 27 09:08:13 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 27 09:08:13 vmfsppjb006 systemd-fsck[1565]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 27 09:08:13 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 27 09:08:15 vmfsppjb006 kernel: EXT4-fs (sdb1): mounted filesystem with ordered data mode. Opts: (null)
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Reloading.
Oct 27 09:08:15 vmfsppjb006 chronyd[902]: Selected source 3.114.30.212
Oct 27 09:08:15 vmfsppjb006 chronyd[902]: System clock TAI offset set to 37 seconds
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started Initial cloud-init job (metadata service crawler).
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Reached target Network is Online.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Starting Crash recovery kernel arming...
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started Azure Linux Agent.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Reached target Cloud-config availability.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Starting Apply the settings specified in cloud-config...
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Starting OpenSSH server daemon...
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Starting Permit User Sessions...
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started Permit User Sessions.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started Serial Getty on ttyS0.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started Job spooling tools.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started Command Scheduler.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started Getty on tty1.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Reached target Login Prompts.
Oct 27 09:08:15 vmfsppjb006 systemd[1]: Started OpenSSH server daemon.
Oct 27 09:08:16 vmfsppjb006 rsyslogd[1681]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="1681" x-info="https://www.rsyslog.com"] start
Oct 27 09:08:16 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 27 09:08:16 vmfsppjb006 rsyslogd[1681]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 27 09:08:16 vmfsppjb006 cloud-init[1684]: Cloud-init v. 19.4 running 'modules:config' at Wed, 27 Oct 2021 00:08:16 +0000. Up 32.25 seconds.
Oct 27 09:08:16 vmfsppjb006 systemd[1]: Started Apply the settings specified in cloud-config.
Oct 27 09:08:16 vmfsppjb006 systemd[1]: Starting Execute cloud user/final scripts...
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.780025Z INFO Daemon Azure Linux Agent Version:2.2.46
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.932588Z INFO Daemon OS: redhat 8.2
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.935007Z INFO Daemon Python: 3.6.8
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.937845Z INFO Daemon CGroups Status: The cgroup filesystem is ready to use
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.942889Z INFO Daemon Run daemon
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.945356Z INFO Daemon No RDMA handler exists for distro='Red Hat Enterprise Linux' version='8.2'
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.972079Z INFO Daemon cloud-init is enabled: True
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.975211Z INFO Daemon Using cloud-init for provisioning
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.978393Z INFO Daemon Clean protocol and wireserver endpoint
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.986123Z INFO Daemon Provisioning already completed, skipping.
Oct 27 09:08:16 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:16.989026Z INFO Daemon RDMA capabilities are not enabled, skipping
Oct 27 09:08:17 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:17.042691Z INFO Daemon Determined Agent WALinuxAgent-2.5.0.2 to be the latest agent
Oct 27 09:08:17 vmfsppjb006 kdumpctl[1682]: Detected change(s) in the following file(s):
Oct 27 09:08:17 vmfsppjb006 kdumpctl[1682]:  
Oct 27 09:08:17 vmfsppjb006 kdumpctl[1682]:  /etc/fstab
Oct 27 09:08:17 vmfsppjb006 kdumpctl[1682]: Rebuilding /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img
Oct 27 09:08:17 vmfsppjb006 cloud-init[1748]: Cloud-init v. 19.4 running 'modules:final' at Wed, 27 Oct 2021 00:08:17 +0000. Up 32.86 seconds.
Oct 27 09:08:17 vmfsppjb006 cloud-init[1748]: Cloud-init v. 19.4 finished at Wed, 27 Oct 2021 00:08:17 +0000. Datasource DataSourceAzure [seed=/dev/sr0].  Up 32.95 seconds
Oct 27 09:08:17 vmfsppjb006 echo[1802]: trying to reload or restart NetworkManager.service
Oct 27 09:08:17 vmfsppjb006 systemd[1]: Reloading Network Manager.
Oct 27 09:08:17 vmfsppjb006 NetworkManager[1042]: <info>  [1635293297.8077] audit: op="reload" arg="0" pid=1808 uid=0 result="success"
Oct 27 09:08:17 vmfsppjb006 NetworkManager[1042]: <info>  [1635293297.8082] config: signal: SIGHUP (no changes from disk)
Oct 27 09:08:17 vmfsppjb006 systemd[1]: Reloaded Network Manager.
Oct 27 09:08:17 vmfsppjb006 systemd[1]: Started Execute cloud user/final scripts.
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.105613Z INFO ExtHandler ExtHandler The agent will now check for updates and then will process extensions. Output to /dev/console will be suspended during those operations.
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.204647Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.5.0.2 is running as the goal state agent
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.205004Z INFO ExtHandler ExtHandler Detect protocol endpoint
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.205076Z INFO ExtHandler ExtHandler Clean protocol and wireserver endpoint
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.205213Z INFO ExtHandler ExtHandler WireServer endpoint is not found. Rerun dhcp handler
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.205277Z INFO ExtHandler ExtHandler Test for route to 168.63.129.16
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.205464Z INFO ExtHandler ExtHandler Route to 168.63.129.16 exists
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.205526Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.259507Z INFO ExtHandler ExtHandler Fabric preferred wire protocol version:2015-04-05
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.259782Z INFO ExtHandler ExtHandler Wire protocol version:2012-11-30
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.259837Z INFO ExtHandler ExtHandler Server preferred version:2015-04-05
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.389671Z INFO ExtHandler ExtHandler Initializing goal state during protocol detection
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.399463Z INFO ExtHandler ExtHandler Fetching new goal state [incarnation 1 (force update)]
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.459790Z INFO ExtHandler ExtHandler Found private key matching thumbprint 4ADAF2CB1BA30C7045CE7DDCCEF4DD0D426D62FC
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.464227Z INFO ExtHandler ExtHandler Fetch goal state completed
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.625044Z INFO ExtHandler ExtHandler Distro: redhat-8.2; OSUtil: RedhatOSUtil; AgentService: waagent; Python: 3.6.8; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.14.0;
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.629487Z INFO ExtHandler ExtHandler WALinuxAgent-2.5.0.2 running as process 1768
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.632196Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['redhat', '8.2', 'Ootpa', 'Red Hat Enterprise Linux']
Oct 27 09:08:18 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:18.640768Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.027121Z INFO ExtHandler ExtHandler Firewalld.service present on the VM, setting up permanent rules on the VM
Oct 27 09:08:19 vmfsppjb006 dracut[2062]: dracut-049-70.git20200228.el8
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.766829Z INFO ExtHandler ExtHandler Firewall rules already set. No change needed.
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.767382Z INFO ExtHandler ExtHandler Persistent firewall rules setup successfully
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.768127Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True]
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.770474Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.770580Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.770900Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.771071Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: Iface#011Destination#011Gateway #011Flags#011RefCnt#011Use#011Metric#011Mask#011#011MTU#011Window#011IRTT
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: eth0#01100000000#01101461E0A#0110003#0110#0110#011100#01100000000#0110#0110#0110
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: eth0#01100461E0A#01100000000#0110001#0110#0110#011100#011E0FFFFFF#0110#0110#0110
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: eth0#01110813FA8#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: eth0#011FEA9FEA9#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.772216Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.778566Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.778855Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.779266Z INFO EnvHandler ExtHandler Configure routes
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.779353Z INFO EnvHandler ExtHandler Gateway:None
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.779412Z INFO EnvHandler ExtHandler Routes:None
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.779785Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.784213Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.784890Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.788385Z INFO MonitorHandler ExtHandler Network interfaces:
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: Executing ['ip', '-a', '-o', 'link']:
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:68:76:f6 brd ff:ff:ff:ff:ff:ff
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2: eth0    inet 10.30.70.10/27 brd 10.30.70.31 scope global noprefixroute eth0\       valid_lft forever preferred_lft forever
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2: eth0    inet6 fe80::222:48ff:fe68:76f6/64 scope link \       valid_lft forever preferred_lft forever
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.791575Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.792002Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.794374Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.800249Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 09:08:19 vmfsppjb006 dracut[2064]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o "plymouth dash resume ifcfg earlykdump" --mount "/dev/mapper/rootvg-varlv /kdumproot//var xfs defaults,noauto" --no-hostonly-default-device -f /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img 4.18.0-193.47.1.el8_2.x86_64
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.889423Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState started [Incarnation: 1; Activity Id: 10314563-3f9b-4c66-af22-986fcaa4361d; Correlation Id: cefc5994-e711-427a-8414-e03b4943e69b; GS Creation Time: 2021-10-27T00:07:23.538818Z]
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.889893Z INFO ExtHandler ExtHandler No extension/run-time settings settings found for Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.946174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Target handler state: enabled [incarnation 1]
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.951944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] [Enable] current handler state is: enabled
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.952065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Update settings file: 0.settings
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.952344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Requested extension state: enabled
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.952802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Enable extension: [./install.sh enable]
Oct 27 09:08:19 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:19.953125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.1974.1", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 27 09:08:20 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:20.052668Z INFO EnvHandler ExtHandler Set block dev timeout: sdb with timeout: 300
Oct 27 09:08:20 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:20.052865Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300
Oct 27 09:08:20 vmfsppjb006 dracut[2064]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 27 09:08:20 vmfsppjb006 dracut[2064]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 27 09:08:20 vmfsppjb006 dracut[2064]: dracut module 'ifcfg' will not be installed, because it's in the list to be omitted!
Oct 27 09:08:20 vmfsppjb006 dracut[2064]: dracut module 'plymouth' will not be installed, because it's in the list to be omitted!
Oct 27 09:08:20 vmfsppjb006 dracut[2064]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 27 09:08:20 vmfsppjb006 dracut[2064]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'resume' will not be installed, because it's in the list to be omitted!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found!
Oct 27 09:08:21 vmfsppjb006 dracut[2064]: dracut module 'earlykdump' will not be installed, because it's in the list to be omitted!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 27 09:08:22 vmfsppjb006 dracut[2064]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 27 09:08:24 vmfsppjb006 dracut[2064]: *** Including module: bash ***
Oct 27 09:08:24 vmfsppjb006 dracut[2064]: *** Including module: systemd ***
Oct 27 09:08:24 vmfsppjb006 dracut[2064]: *** Including module: systemd-initrd ***
Oct 27 09:08:24 vmfsppjb006 dracut[2064]: *** Including module: nss-softokn ***
Oct 27 09:08:24 vmfsppjb006 dracut[2064]: *** Including module: rngd ***
Oct 27 09:08:24 vmfsppjb006 dracut[2064]: *** Including module: i18n ***
Oct 27 09:08:26 vmfsppjb006 dracut[2064]: *** Including module: drm ***
Oct 27 09:08:26 vmfsppjb006 dracut[2064]: *** Including module: prefixdevname ***
Oct 27 09:08:26 vmfsppjb006 dracut[2064]: *** Including module: dm ***
Oct 27 09:08:26 vmfsppjb006 dracut[2064]: Skipping udev rule: 64-device-mapper.rules
Oct 27 09:08:26 vmfsppjb006 dracut[2064]: Skipping udev rule: 60-persistent-storage-dm.rules
Oct 27 09:08:26 vmfsppjb006 dracut[2064]: Skipping udev rule: 55-dm.rules
Oct 27 09:08:27 vmfsppjb006 dracut[2064]: *** Including module: kernel-modules ***
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:28.997772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Command: ./install.sh enable
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: [stdout]
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: Checking if system is supported
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: This system is supported
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: Enabling Azure Network Watcher Agent
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: Force kill all NetworkWatcher Agent related processes
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: Linux version 4.18.0-193.47.1.el8_2.x86_64 (mockbuild@x86-vm-07.build.eng.bos.redhat.com) (gcc version 8.3.1 20191121 (Red Hat 8.3.1-5) (GCC)) #1 SMP Thu Mar 4 03:03:32 EST 2021
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: Setting up Red Hat environment for SSL handshakes
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: Starting AzureNetworkWatcherAgent...Started[0]
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: Core limit: 0
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: [stderr]
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    echo "Disabling Azure Network Watcher Agent"
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    forceKillOldAgent
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: }
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: uninstall()
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: {
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    echo "Uninstalling Azure Network Watcher Agent"
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    forceKillOldAgent
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: }
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: install()
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: {
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    echo "Installing Azure Network Watcher Agent"
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    forceKillOldAgent
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    continueOnUpdateFailureConfigured
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    if [ $? -eq 1 ]; then
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:        extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:        if [ $? -eq 1 ]; then
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:            echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE"
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:            uninstall
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:        fi
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    fi
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: }
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: update()
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: {
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    echo "Updating Azure Network Watcher Agent"
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    continueOnUpdateFailureConfigured
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    if [ $? -eq 1 ]; then
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:        extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:        if [ $? -eq 1 ]; then
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:            echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE"
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:            disable
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:        fi
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    fi
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    install
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: }
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: enable()
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]: {
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    echo "Enabling Azure Network Watcher Agent"
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    forceKillOldAgent
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    /etc/init.d/AzureNetworkWatcherAgent start
Oct 27 09:08:28 vmfsppjb006 python3.6[1683]:    # after agent start the process controller forks child process that
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # initializing the environmet writing X.status file in
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # /var/lib/waagent/NWA folder. Unfortunately until environment is received
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # the status file could not be created since environment contains all the
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # informaton about destination folder, seq id etc. If X.status file is not
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # there waagent caused a failure that is shown in UI as deployment problem
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # even though agent is running successfully. In order to avoid the UI
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # failure the simple thing for now is to wait for a bit until fork is done,
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # later when waagent has better logic to handle a status it should be
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    # removed.
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    sleep 7s
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: }
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: GLIBC_MINVERSION="2.11"
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: + GLIBC_MINVERSION=2.11
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: GLIBC_MINVERSION_MAJOR=2
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: + GLIBC_MINVERSION_MAJOR=2
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: GLIBC_MINVERSION_MINOR=11
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: + GLIBC_MINVERSION_MINOR=11
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: is_version_supported()
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: {
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    curversion=$1
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    if [ "$curversion" = "$GLIBC_MINVERSION" ]; then
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:        return 1
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    fi
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    local hasdot=0
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    local delim=.
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    case $curversion in
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:        *$delim*) hasdot=1;;
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:        *) hasdot=0;;
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    esac
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:    if [ $hasdot -eq 1 ]; then
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:        firstval=`echo $curversion | cut -d "." -f 1`
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:        if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:            return 1
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:        elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:            return 0
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]:        e
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:29.213721Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Target handler state: enabled [incarnation 1]
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:29.242713Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] [Enable] current handler state is: enabled
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:29.242854Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Extension has no settings, write empty 0.settings
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:29.245898Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Enable extension: [scripts/run_python.sh scripts/enableHandler.py 1>&2]
Oct 27 09:08:29 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:29.246326Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Executing command: /var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500/scripts/run_python.sh scripts/enableHandler.py 1>&2 with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "9.10.11.17500", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 27 09:08:29 vmfsppjb006 dracut[2064]: *** Including module: kernel-modules-extra ***
Oct 27 09:08:29 vmfsppjb006 dracut[2064]: *** Including module: lvm ***
Oct 27 09:08:29 vmfsppjb006 dracut[2064]: Skipping udev rule: 64-device-mapper.rules
Oct 27 09:08:29 vmfsppjb006 dracut[2064]: Skipping udev rule: 56-lvm.rules
Oct 27 09:08:29 vmfsppjb006 dracut[2064]: Skipping udev rule: 60-persistent-storage-lvm.rules
Oct 27 09:08:32 vmfsppjb006 dracut[2064]: *** Including module: fstab-sys ***
Oct 27 09:08:33 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:33.257573Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Command: scripts/run_python.sh scripts/enableHandler.py 1>&2
Oct 27 09:08:33 vmfsppjb006 python3.6[1683]: [stdout]
Oct 27 09:08:33 vmfsppjb006 python3.6[1683]: [stderr]
Oct 27 09:08:33 vmfsppjb006 python3.6[1683]: Microsoft Dependency Agent service started.
Oct 27 09:08:33 vmfsppjb006 dracut[2064]: *** Including module: rootfs-block ***
Oct 27 09:08:34 vmfsppjb006 dracut[2064]: *** Including module: terminfo ***
Oct 27 09:08:37 vmfsppjb006 kernel: bluechannel: loading out-of-tree module taints kernel.
Oct 27 09:08:37 vmfsppjb006 kernel: bluechannel: module license 'Proprietary' taints kernel.
Oct 27 09:08:37 vmfsppjb006 kernel: Disabling lock debugging due to kernel taint
Oct 27 09:08:37 vmfsppjb006 kernel: bluechannel: module verification failed: signature and/or required key missing - tainting kernel
Oct 27 09:08:37 vmfsppjb006 kernel: bluechannel: driver loading ver=9.10.11 rev=17500
Oct 27 09:08:37 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:37.214636Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Target handler state: enabled [incarnation 1]
Oct 27 09:08:37 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:37.262758Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] [Enable] current handler state is: enabled
Oct 27 09:08:37 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:37.262918Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Update settings file: 0.settings
Oct 27 09:08:37 vmfsppjb006 dracut[2064]: *** Including module: udev-rules ***
Oct 27 09:08:37 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:37.473280Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Requested extension state: enabled
Oct 27 09:08:37 vmfsppjb006 kernel: msda: driver loading ver=9.10.11 rev=17500
Oct 27 09:08:37 vmfsppjb006 kernel: msda: ipv6 support is active
Oct 27 09:08:37 vmfsppjb006 kernel: msda: bluechannel_link @000000008a383782
Oct 27 09:08:37 vmfsppjb006 kernel: msda: bluechannel_broadcast_heartbeat @00000000238a921b
Oct 27 09:08:37 vmfsppjb006 kernel: sock_create v4 socket
Oct 27 09:08:37 vmfsppjb006 kernel: Supertramp allocated at 00000000c59f1ec0
Oct 27 09:08:37 vmfsppjb006 kernel: msda: device registered at 10.56
Oct 27 09:08:37 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:37.710610Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable extension: [omsagent_shim.sh -enable]
Oct 27 09:08:37 vmfsppjb006 python3.6[1683]: 2021-10-27T00:08:37.711706Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Executing command: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/omsagent_shim.sh -enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.13.40", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 27 09:08:45 vmfsppjb006 dracut[2064]: Skipping udev rule: 91-permissions.rules
Oct 27 09:08:45 vmfsppjb006 dracut[2064]: Skipping udev rule: 80-drivers-modprobe.rules
Oct 27 09:08:45 vmfsppjb006 dracut[2064]: *** Including module: dracut-systemd ***
Oct 27 09:08:45 vmfsppjb006 dracut[2064]: *** Including module: usrmount ***
Oct 27 09:08:45 vmfsppjb006 dracut[2064]: *** Including module: base ***
Oct 27 09:08:45 vmfsppjb006 kernel: msda: set_shm_size=0x800000
Oct 27 09:08:45 vmfsppjb006 kernel: msda: attaching hooks
Oct 27 09:08:45 vmfsppjb006 kernel: shm_area: initialized
Oct 27 09:08:45 vmfsppjb006 kernel: msda: invoking bluechannel_link: LINK {handle_bluechannel_event=0000000004889941}
Oct 27 09:08:45 vmfsppjb006 kernel: bluechannel: transition to LINKED
Oct 27 09:08:45 vmfsppjb006 kernel: msda: starting extants
Oct 27 09:08:45 vmfsppjb006 kernel: msda: extants complete
Oct 27 09:08:45 vmfsppjb006 kernel: msda: mmap requested size=8388608 area_size=8388608
Oct 27 09:08:47 vmfsppjb006 kernel: hv_balloon: Max. dynamic memory size: 2048 MB
Oct 27 09:08:47 vmfsppjb006 dracut[2064]: *** Including module: fs-lib ***
Oct 27 09:08:51 vmfsppjb006 dracut[2064]: *** Including module: kdumpbase ***
Oct 27 09:08:55 vmfsppjb006 dracut[2064]: *** Including module: microcode_ctl-fw_dir_override ***
Oct 27 09:08:55 vmfsppjb006 dracut[2064]:  microcode_ctl module: mangling fw_dir
Oct 27 09:08:55 vmfsppjb006 dracut[2064]:    microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware"
Oct 27 09:08:55 vmfsppjb006 dracut[2064]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel"...
Oct 27 09:08:55 vmfsppjb006 dracut[2064]:      microcode_ctl: intel: caveats check for kernel version "4.18.0-193.47.1.el8_2.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel" to fw_dir variable
Oct 27 09:08:55 vmfsppjb006 dracut[2064]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"...
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: configuration "intel-06-2d-07" is ignored
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"...
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: configuration "intel-06-4e-03" is ignored
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"...
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: configuration "intel-06-4f-01" is ignored
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"...
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: configuration "intel-06-55-04" is ignored
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"...
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: configuration "intel-06-5e-03" is ignored
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"...
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: configuration "intel-06-8c-01" is ignored
Oct 27 09:08:56 vmfsppjb006 dracut[2064]:    microcode_ctl: final fw_dir: "/usr/share/microcode_ctl/ucode_with_caveats/intel /lib/firmware/updates /lib/firmware"
Oct 27 09:08:56 vmfsppjb006 dracut[2064]: *** Including module: shutdown ***
Oct 27 09:08:56 vmfsppjb006 dracut[2064]: *** Including module: squash ***
Oct 27 09:08:56 vmfsppjb006 dracut[2064]: *** Including modules done ***
Oct 27 09:08:56 vmfsppjb006 dracut[2064]: *** Installing kernel module dependencies ***
Oct 27 09:08:56 vmfsppjb006 dracut[2064]: *** Installing kernel module dependencies done ***
Oct 27 09:08:56 vmfsppjb006 dracut[2064]: *** Resolving executable dependencies ***
Oct 27 09:09:00 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 09:09:01 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 09:09:01 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 09:09:04 vmfsppjb006 dracut[2064]: *** Resolving executable dependencies done***
Oct 27 09:09:04 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 09:09:04 vmfsppjb006 systemd[1]: Created slice system-user\x2druntime\x2ddir.slice.
Oct 27 09:09:04 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 09:09:04 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 09:09:04 vmfsppjb006 systemd[1]: Started Session 1 of user omsagent.
Oct 27 09:09:04 vmfsppjb006 python3.6[1683]: 2021-10-27T00:09:04.755074Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Command: omsagent_shim.sh -enable
Oct 27 09:09:04 vmfsppjb006 python3.6[1683]: [stdout]
Oct 27 09:09:04 vmfsppjb006 python3.6[1683]: 2021/10/27 09:09:03 [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable,success,0,Enable succeeded
Oct 27 09:09:04 vmfsppjb006 python3.6[1683]: [stderr]
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Starting D-Bus User Message Bus Socket.
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Reached target Paths.
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Reached target Timers.
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Listening on D-Bus User Message Bus Socket.
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Reached target Sockets.
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Reached target Basic System.
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Reached target Default.
Oct 27 09:09:06 vmfsppjb006 systemd[6180]: Startup finished in 1.787s.
Oct 27 09:09:06 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 09:09:06 vmfsppjb006 python3.6[1683]: 2021-10-27T00:09:06.282968Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState completed [Incarnation: 1; 46393 ms; Activity Id: 10314563-3f9b-4c66-af22-986fcaa4361d; Correlation Id: cefc5994-e711-427a-8414-e03b4943e69b; GS Creation Time: 2021-10-27T00:07:23.538818Z]
Oct 27 09:09:07 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:09:07 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Stopped target Default.
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Stopped target Basic System.
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Stopped target Sockets.
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Closed D-Bus User Message Bus Socket.
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Stopped target Paths.
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Reached target Shutdown.
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Starting Exit the Session...
Oct 27 09:09:07 vmfsppjb006 systemd[6180]: Stopped target Timers.
Oct 27 09:09:07 vmfsppjb006 systemd[1]: user@986.service: Killing process 6242 (systemctl) with signal SIGKILL.
Oct 27 09:09:07 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:09:07 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 09:09:07 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:09:07 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 09:09:07 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 09:09:07 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 09:09:11 vmfsppjb006 dracut[2064]: *** Hardlinking files ***
Oct 27 09:09:11 vmfsppjb006 python3.6[1683]: 2021-10-27T00:09:11.333577Z INFO ExtHandler ExtHandler Extension status: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 27 09:09:11 vmfsppjb006 python3.6[1683]: 2021-10-27T00:09:11.334339Z INFO ExtHandler ExtHandler All extensions in the goal state have reached a terminal state: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 27 09:09:11 vmfsppjb006 python3.6[1683]: 2021-10-27T00:09:11.334732Z INFO ExtHandler ExtHandler Looking for existing remote access users.
Oct 27 09:09:11 vmfsppjb006 sssd[nss][924]: Enumeration requested but not enabled
Oct 27 09:09:11 vmfsppjb006 python3.6[1683]: 2021-10-27T00:09:11.347551Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 09:09:11 vmfsppjb006 dracut[2064]: *** Hardlinking files done ***
Oct 27 09:09:11 vmfsppjb006 dracut[2064]: *** Stripping files ***
Oct 27 09:09:12 vmfsppjb006 dracut[2064]: *** Stripping files done ***
Oct 27 09:09:12 vmfsppjb006 dracut[2064]: *** Generating early-microcode cpio image ***
Oct 27 09:09:12 vmfsppjb006 dracut[2064]: *** Constructing GenuineIntel.bin ****
Oct 27 09:09:12 vmfsppjb006 dracut[2064]: *** Store current command line parameters ***
Oct 27 09:09:12 vmfsppjb006 dracut[2064]: Stored kernel commandline:
Oct 27 09:09:12 vmfsppjb006 dracut[2064]: rd.lvm.lv=rootvg/varlv
Oct 27 09:09:12 vmfsppjb006 dracut[2064]: *** Creating image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' ***
Oct 27 09:09:26 vmfsppjb006 dracut[2064]: *** Creating initramfs image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' done ***
Oct 27 09:09:46 vmfsppjb006 kdumpctl[1682]: kexec: loaded kdump kernel
Oct 27 09:09:46 vmfsppjb006 kdumpctl[1682]: Starting kdump: [OK]
Oct 27 09:09:46 vmfsppjb006 systemd[1]: Started Crash recovery kernel arming.
Oct 27 09:09:59 vmfsppjb006 systemd[1]: Started MySQL Server.
Oct 27 09:09:59 vmfsppjb006 systemd[1]: Starting Jobarranger Monitor...
Oct 27 09:09:59 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 27 09:09:59 vmfsppjb006 systemd[1]: Starting Zabbix Server...
Oct 27 09:10:00 vmfsppjb006 systemd[1]: jobarg-monitor.service: Can't open PID file /run/jobarranger/jobarg_monitor.pid (yet?) after start: No such file or directory
Oct 27 09:10:00 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 27 09:10:00 vmfsppjb006 systemd[1]: zabbix-server.service: Can't open PID file /run/zabbix/zabbix_server.pid (yet?) after start: No such file or directory
Oct 27 09:10:00 vmfsppjb006 journal[6672]: Job Arranger Monitor[6672]: Starting Job Arranger monitor. Job Arranger 5.0.1 (revision 7557).
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Started Jobarranger Monitor.
Oct 27 09:10:00 vmfsppjb006 journal[6675]: Job Arranger Monitor[6675]: jobarg_monitor #0 started [monitor]
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Started Zabbix Server.
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Reached target Multi-User System.
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Starting Update UTMP about System Runlevel Changes...
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Starting Azure temporary resource disk dataloss warning file creation...
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Reached target Cloud-init target.
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Started Update UTMP about System Runlevel Changes.
Oct 27 09:10:00 vmfsppjb006 journal[6674]: Job Arranger Server[6674]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 27 09:10:00 vmfsppjb006 journal[6674]: Job Arranger Server[6674]: [JASERVER000003] server #0 started [main process]
Oct 27 09:10:00 vmfsppjb006 journal[6683]: Job Arranger Server[6683]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 27 09:10:00 vmfsppjb006 journal[6684]: Job Arranger Server[6684]: [JASERVER000004] server #2 started [start the job #1]
Oct 27 09:10:00 vmfsppjb006 journal[6685]: Job Arranger Server[6685]: [JASERVER000004] server #3 started [check the running job #1]
Oct 27 09:10:00 vmfsppjb006 journal[6686]: Job Arranger Server[6686]: [JASERVER000004] server #4 started [job trapper #1]
Oct 27 09:10:00 vmfsppjb006 journal[6687]: Job Arranger Server[6687]: [JASERVER000004] server #5 started [job trapper #2]
Oct 27 09:10:00 vmfsppjb006 journal[6688]: Job Arranger Server[6688]: [JASERVER000004] server #6 started [job trapper #3]
Oct 27 09:10:00 vmfsppjb006 journal[6689]: Job Arranger Server[6689]: [JASERVER000004] server #7 started [job trapper #4]
Oct 27 09:10:00 vmfsppjb006 journal[6690]: Job Arranger Server[6690]: [JASERVER000004] server #8 started [job trapper #5]
Oct 27 09:10:00 vmfsppjb006 journal[6691]: Job Arranger Server[6691]: [JASERVER000004] server #9 started [job loader #1]
Oct 27 09:10:00 vmfsppjb006 journal[6692]: Job Arranger Server[6692]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 27 09:10:00 vmfsppjb006 journal[6693]: Job Arranger Server[6693]: [JASERVER000004] server #11 started [message send #1]
Oct 27 09:10:00 vmfsppjb006 journal[6694]: Job Arranger Server[6694]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 27 09:10:00 vmfsppjb006 temp-disk-dataloss-warning[6679]: Creating a dataloss warning file at /mnt/DATALOSS_WARNING_README.txt
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Started Azure temporary resource disk dataloss warning file creation.
Oct 27 09:10:00 vmfsppjb006 systemd[1]: Startup finished in 1.275s (kernel) + 9.567s (initrd) + 2min 5.259s (userspace) = 2min 16.102s.
Oct 27 09:10:03 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:10:03 vmfsppjb006 dbus-daemon[6729]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:10:05 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:10:09 vmfsppjb006 setroubleshoot[6729]: SELinux is preventing zabbix_server from using the dac_override capability. For complete SELinux messages run: sealert -l a6656240-7d68-4406-88d9-8f8364246780
Oct 27 09:10:09 vmfsppjb006 platform-python[6729]: SELinux is preventing zabbix_server from using the dac_override capability.#012#012*****  Plugin dac_override (91.4 confidence) suggests   **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012*****  Plugin catchall (9.59 confidence) suggests   **************************#012#012If you believe that zabbix_server should have the dac_override capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:10:12 vmfsppjb006 setroubleshoot[6729]: failed to retrieve rpm info for /run/zabbix/zabbix_server_preprocessing.sock
Oct 27 09:10:12 vmfsppjb006 setroubleshoot[6729]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:10:12 vmfsppjb006 platform-python[6729]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_preprocessing.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_preprocessing.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:17:47 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 09:17:55 vmfsppjb006 dnf[7232]: packages-microsoft-com-prod                      15 kB/s | 3.0 kB     00:00
Oct 27 09:17:55 vmfsppjb006 dnf[7232]: MySQL 8.0 Community Server                       67 kB/s | 2.6 kB     00:00
Oct 27 09:17:56 vmfsppjb006 dnf[7232]: MySQL Connectors Community                       64 kB/s | 2.6 kB     00:00
Oct 27 09:17:56 vmfsppjb006 dnf[7232]: MySQL Tools Community                            66 kB/s | 2.6 kB     00:00
Oct 27 09:17:57 vmfsppjb006 dnf[7232]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.2 kB/s | 2.4 kB     00:00
Oct 27 09:18:01 vmfsppjb006 dnf[7232]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.4 kB/s | 2.8 kB     00:00
Oct 27 09:18:05 vmfsppjb006 dnf[7232]: Microsoft Azure RPMs for RHEL8 Extended Update  6.0 kB/s | 2.1 kB     00:00
Oct 27 09:18:05 vmfsppjb006 dnf[7232]: Zabbix Official Repository - x86_64              13 kB/s | 2.9 kB     00:00
Oct 27 09:18:05 vmfsppjb006 dnf[7232]: Zabbix Official Repository non-supported - x86_  12 kB/s | 3.0 kB     00:00
Oct 27 09:18:07 vmfsppjb006 dnf[7232]: Metadata cache created.
Oct 27 09:18:07 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 09:18:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:18:37 vmfsppjb006 dbus-daemon[7292]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:18:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:18:38 vmfsppjb006 setroubleshoot[7292]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:18:38 vmfsppjb006 setroubleshoot[7292]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:18:38 vmfsppjb006 platform-python[7292]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:22:47 vmfsppjb006 systemd[1]: Starting Cleanup of Temporary Directories...
Oct 27 09:22:47 vmfsppjb006 systemd-tmpfiles[7535]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 27 09:22:47 vmfsppjb006 systemd-tmpfiles[7535]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 27 09:22:48 vmfsppjb006 systemd[1]: Started Cleanup of Temporary Directories.
Oct 27 09:23:17 vmfsppjb006 python3.6[1683]: 2021-10-27T00:23:17.129523Z INFO Daemon Agent WALinuxAgent-2.5.0.2 launched with command '/usr/bin/python3.6 -u bin/WALinuxAgent-2.5.0.2-py2.7.egg -run-exthandlers' is successfully running
Oct 27 09:23:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:23:37 vmfsppjb006 dbus-daemon[7582]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:23:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:23:38 vmfsppjb006 setroubleshoot[7582]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:23:38 vmfsppjb006 setroubleshoot[7582]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:23:38 vmfsppjb006 platform-python[7582]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Started Session 3 of user omsagent.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Starting D-Bus User Message Bus Socket.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Reached target Timers.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Reached target Paths.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Listening on D-Bus User Message Bus Socket.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Reached target Sockets.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Reached target Basic System.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Reached target Default.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Startup finished in 49ms.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Stopped target Default.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Stopped target Basic System.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Stopped target Timers.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Stopped target Sockets.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Closed D-Bus User Message Bus Socket.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Stopped target Paths.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Reached target Shutdown.
Oct 27 09:24:01 vmfsppjb006 systemd[7613]: Starting Exit the Session...
Oct 27 09:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 7663 (systemctl) with signal SIGKILL.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 09:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 09:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:24:37 vmfsppjb006 dbus-daemon[7710]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:24:38 vmfsppjb006 setroubleshoot[7710]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:24:38 vmfsppjb006 setroubleshoot[7710]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:24:38 vmfsppjb006 platform-python[7710]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:33:05 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 09:33:06 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 09:33:06 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 09:33:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:33:37 vmfsppjb006 dbus-daemon[8301]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:33:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:33:38 vmfsppjb006 setroubleshoot[8301]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:33:38 vmfsppjb006 setroubleshoot[8301]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:33:38 vmfsppjb006 platform-python[8301]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:38:23 vmfsppjb006 systemd[1]: Started /run/user/1000 mount wrapper.
Oct 27 09:38:23 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1000.
Oct 27 09:38:23 vmfsppjb006 systemd[1]: Starting User Manager for UID 1000...
Oct 27 09:38:23 vmfsppjb006 systemd[1]: Started Session 5 of user finsrvpf.
Oct 27 09:38:23 vmfsppjb006 systemd-logind[931]: New session 5 of user finsrvpf.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Reached target Paths.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Starting D-Bus User Message Bus Socket.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Reached target Timers.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Listening on D-Bus User Message Bus Socket.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Reached target Sockets.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Reached target Basic System.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Reached target Default.
Oct 27 09:38:23 vmfsppjb006 systemd[8583]: Startup finished in 48ms.
Oct 27 09:38:23 vmfsppjb006 systemd[1]: Started User Manager for UID 1000.
Oct 27 09:38:32 vmfsppjb006 su[8623]: (to root) finsrvpf on pts/0
Oct 27 09:38:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:38:37 vmfsppjb006 dbus-daemon[8660]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:38:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:38:38 vmfsppjb006 setroubleshoot[8660]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:38:39 vmfsppjb006 setroubleshoot[8660]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:38:39 vmfsppjb006 platform-python[8660]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 09:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 09:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 09:39:01 vmfsppjb006 systemd[1]: Started Session 7 of user omsagent.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Reached target Paths.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Reached target Timers.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Starting D-Bus User Message Bus Socket.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Listening on D-Bus User Message Bus Socket.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Reached target Sockets.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Reached target Basic System.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Reached target Default.
Oct 27 09:39:01 vmfsppjb006 systemd[8702]: Startup finished in 45ms.
Oct 27 09:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 09:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Stopped target Default.
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Stopped target Basic System.
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Stopped target Timers.
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Stopped target Sockets.
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Stopped target Paths.
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Closed D-Bus User Message Bus Socket.
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Reached target Shutdown.
Oct 27 09:39:02 vmfsppjb006 systemd[8702]: Starting Exit the Session...
Oct 27 09:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 8743 (systemctl) with signal SIGKILL.
Oct 27 09:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 09:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 09:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 09:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 09:39:14 vmfsppjb006 python3.6[1683]: 2021-10-27T00:39:14.484400Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 1;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 09:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:39:37 vmfsppjb006 dbus-daemon[8791]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:39:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:39:38 vmfsppjb006 setroubleshoot[8791]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:39:39 vmfsppjb006 setroubleshoot[8791]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:39:39 vmfsppjb006 platform-python[8791]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:40:25 vmfsppjb006 systemd[8583]: Starting Mark boot as successful...
Oct 27 09:40:25 vmfsppjb006 systemd[8583]: Started Mark boot as successful.
Oct 27 09:40:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:40:37 vmfsppjb006 dbus-daemon[8858]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:40:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:40:38 vmfsppjb006 setroubleshoot[8858]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:40:39 vmfsppjb006 setroubleshoot[8858]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:40:39 vmfsppjb006 platform-python[8858]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:41:11 vmfsppjb006 systemd[1]: Started Session 9 of user finsrvpf.
Oct 27 09:41:11 vmfsppjb006 systemd-logind[931]: New session 9 of user finsrvpf.
Oct 27 09:41:25 vmfsppjb006 su[8932]: (to root) finsrvpf on pts/1
Oct 27 09:41:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:41:37 vmfsppjb006 dbus-daemon[8970]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:41:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:41:38 vmfsppjb006 setroubleshoot[8970]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:41:39 vmfsppjb006 setroubleshoot[8970]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:41:39 vmfsppjb006 platform-python[8970]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:42:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:42:37 vmfsppjb006 dbus-daemon[9034]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:42:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:42:38 vmfsppjb006 setroubleshoot[9034]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:42:39 vmfsppjb006 setroubleshoot[9034]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:42:39 vmfsppjb006 platform-python[9034]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Started Session 10 of user omsagent.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Reached target Timers.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Reached target Paths.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Starting D-Bus User Message Bus Socket.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Listening on D-Bus User Message Bus Socket.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Reached target Sockets.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Reached target Basic System.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Reached target Default.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Startup finished in 47ms.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Stopped target Default.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Stopped target Basic System.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Stopped target Timers.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Stopped target Sockets.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Closed D-Bus User Message Bus Socket.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Stopped target Paths.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Reached target Shutdown.
Oct 27 09:54:01 vmfsppjb006 systemd[9694]: Starting Exit the Session...
Oct 27 09:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 9736 (systemctl) with signal SIGKILL.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 09:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 09:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:54:37 vmfsppjb006 dbus-daemon[9775]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:54:38 vmfsppjb006 setroubleshoot[9775]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:54:39 vmfsppjb006 setroubleshoot[9775]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:54:39 vmfsppjb006 platform-python[9775]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:57:09 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 09:57:10 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 09:57:10 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 09:57:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 09:57:37 vmfsppjb006 dbus-daemon[10023]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 09:57:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 09:57:38 vmfsppjb006 setroubleshoot[10023]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 09:57:39 vmfsppjb006 setroubleshoot[10023]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 09:57:39 vmfsppjb006 platform-python[10023]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 09:59:02 vmfsppjb006 finsrvpf[10114]: This is Error
Oct 27 10:01:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:01:37 vmfsppjb006 dbus-daemon[10280]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:01:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:01:38 vmfsppjb006 setroubleshoot[10280]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:01:39 vmfsppjb006 setroubleshoot[10280]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:01:39 vmfsppjb006 platform-python[10280]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:07:11 vmfsppjb006 su[10593]: (to jobuser) finsrvpf on pts/0
Oct 27 10:07:28 vmfsppjb006 finsrvpf[10635]: This is Error
Oct 27 10:08:20 vmfsppjb006 python3.6[1683]: 2021-10-27T01:08:20.107772Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 10:08:28 vmfsppjb006 systemd[1]: Started Session 12 of user finsrvpf.
Oct 27 10:08:28 vmfsppjb006 systemd-logind[931]: New session 12 of user finsrvpf.
Oct 27 10:08:32 vmfsppjb006 systemd-logind[931]: Session 12 logged out. Waiting for processes to exit.
Oct 27 10:08:32 vmfsppjb006 systemd-logind[931]: Removed session 12.
Oct 27 10:08:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:08:37 vmfsppjb006 dbus-daemon[10725]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:08:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:08:38 vmfsppjb006 setroubleshoot[10725]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:08:39 vmfsppjb006 setroubleshoot[10725]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:08:39 vmfsppjb006 platform-python[10725]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 10:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 10:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Started Session 13 of user omsagent.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Starting D-Bus User Message Bus Socket.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Reached target Timers.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Reached target Paths.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Listening on D-Bus User Message Bus Socket.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Reached target Sockets.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Reached target Basic System.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Reached target Default.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Startup finished in 87ms.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Started Session 15 of user jobuser.
Oct 27 10:09:02 vmfsppjb006 systemd-logind[931]: New session 15 of user jobuser.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Reached target Paths.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Reached target Timers.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Starting D-Bus User Message Bus Socket.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Listening on D-Bus User Message Bus Socket.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Reached target Sockets.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Reached target Basic System.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Reached target Default.
Oct 27 10:09:02 vmfsppjb006 systemd[10781]: Startup finished in 92ms.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Stopped target Default.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Stopped target Basic System.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Stopped target Sockets.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Stopped target Timers.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Stopped target Paths.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Closed D-Bus User Message Bus Socket.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Reached target Shutdown.
Oct 27 10:09:02 vmfsppjb006 systemd[10768]: Starting Exit the Session...
Oct 27 10:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 10848 (systemctl) with signal SIGKILL.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 10:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 10:09:20 vmfsppjb006 python3.6[1683]: 2021-10-27T01:09:20.410977Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 2;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 10:09:25 vmfsppjb006 jobuser[10880]: This is Error
Oct 27 10:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:09:37 vmfsppjb006 dbus-daemon[10893]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:09:37 vmfsppjb006 systemd-logind[931]: Session 15 logged out. Waiting for processes to exit.
Oct 27 10:09:37 vmfsppjb006 systemd-logind[931]: Removed session 15.
Oct 27 10:09:37 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 27 10:09:37 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Stopped target Default.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Stopped target Basic System.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Stopped target Sockets.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Stopped target Paths.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Stopped target Timers.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Closed D-Bus User Message Bus Socket.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Reached target Shutdown.
Oct 27 10:09:37 vmfsppjb006 systemd[10781]: Starting Exit the Session...
Oct 27 10:09:37 vmfsppjb006 systemd[1]: user@1003.service: Killing process 10895 (systemctl) with signal SIGKILL.
Oct 27 10:09:37 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 27 10:09:37 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 27 10:09:37 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 27 10:09:37 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 27 10:09:37 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 27 10:09:37 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 27 10:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:09:38 vmfsppjb006 setroubleshoot[10893]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:09:39 vmfsppjb006 setroubleshoot[10893]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:09:39 vmfsppjb006 platform-python[10893]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:10:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:10:37 vmfsppjb006 dbus-daemon[10968]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:10:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:10:37 vmfsppjb006 setroubleshoot[10968]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:10:38 vmfsppjb006 setroubleshoot[10968]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:10:38 vmfsppjb006 platform-python[10968]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:15:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:15:37 vmfsppjb006 dbus-daemon[11260]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:15:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:15:37 vmfsppjb006 setroubleshoot[11260]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:15:38 vmfsppjb006 setroubleshoot[11260]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:15:38 vmfsppjb006 platform-python[11260]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:18:09 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 10:18:10 vmfsppjb006 dnf[11404]: Metadata cache refreshed recently.
Oct 27 10:18:10 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 10:20:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:20:37 vmfsppjb006 dbus-daemon[11545]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:20:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:20:37 vmfsppjb006 setroubleshoot[11545]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:20:38 vmfsppjb006 setroubleshoot[11545]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:20:38 vmfsppjb006 platform-python[11545]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:21:12 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 10:21:13 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 10:21:13 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 10:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 10:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 10:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 10:24:01 vmfsppjb006 systemd[1]: Started Session 17 of user omsagent.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Reached target Paths.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Starting D-Bus User Message Bus Socket.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Reached target Timers.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Listening on D-Bus User Message Bus Socket.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Reached target Sockets.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Reached target Basic System.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Reached target Default.
Oct 27 10:24:01 vmfsppjb006 systemd[11833]: Startup finished in 45ms.
Oct 27 10:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 10:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Stopped target Default.
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Stopped target Basic System.
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Stopped target Timers.
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Stopped target Sockets.
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Closed D-Bus User Message Bus Socket.
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Stopped target Paths.
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Reached target Shutdown.
Oct 27 10:24:02 vmfsppjb006 systemd[11833]: Starting Exit the Session...
Oct 27 10:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 11875 (systemctl) with signal SIGKILL.
Oct 27 10:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 10:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 10:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 10:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 10:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:24:37 vmfsppjb006 dbus-daemon[11913]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:24:38 vmfsppjb006 setroubleshoot[11913]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:24:38 vmfsppjb006 setroubleshoot[11913]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:24:38 vmfsppjb006 platform-python[11913]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:28:02 vmfsppjb006 logrotate[12118]: ALERT exited abnormally with [1]
Oct 27 10:28:02 vmfsppjb006 rhsmd[12128]: In order for Subscription Manager to provide your system with updates, your system must be registered with the Customer Portal. Please enter your Red Hat login to ensure your system is up-to-date.
Oct 27 10:28:04 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:28:04 vmfsppjb006 dbus-daemon[12134]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:28:05 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:28:05 vmfsppjb006 setroubleshoot[12134]: failed to retrieve rpm info for /var/opt/microsoft/omsconfig/omsconfig.log
Oct 27 10:28:09 vmfsppjb006 setroubleshoot[12134]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log. For complete SELinux messages run: sealert -l 032b50b8-a43a-405d-88e8-f8bba97fe952
Oct 27 10:28:09 vmfsppjb006 platform-python[12134]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log.#012#012*****  Plugin restorecon (94.8 confidence) suggests   ************************#012#012If you want to fix the label. #012/var/opt/microsoft/omsconfig/omsconfig.log default label should be var_log_t.#012Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly.#012Do#012# /sbin/restorecon -v /var/opt/microsoft/omsconfig/omsconfig.log#012#012*****  Plugin catchall_labels (5.21 confidence) suggests   *******************#012#012If you want to allow logrotate to have getattr access on the omsconfig.log file#012Then you need to change the label on /var/opt/microsoft/omsconfig/omsconfig.log#012Do#012# semanage fcontext -a -t FILE_TYPE '/var/opt/microsoft/omsconfig/omsconfig.log'#012where FILE_TYPE is one of the following: NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_log_t, NetworkManager_tmp_t, NetworkManager_unit_file_t, NetworkManager_var_run_t, abrt_dump_oops_exec_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_worker_exec_t, abrt_tmp_t, abrt_unit_file_t, abrt_upload_watch_exec_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_log_t, abrt_var_run_t, abrt_watch_log_exec_t, accountsd_exec_t, accountsd_unit_file_t, acct_data_t, acct_exec_t, acct_initrc_exec_t, admin_crontab_tmp_t, admin_passwd_exec_t, afs_bosserver_exec_t, afs_exec_t, afs_fsserver_exec_t, afs_initrc_exec_t, afs_kaserver_exec_t, afs_logfile_t, afs_ptserver_exec_t, afs_vlserver_exec_t, aiccu_exec_t, aiccu_initrc_exec_t, aiccu_var_run_t, aide_exec_t, aide_log_t, ajaxterm_exec_t, ajaxterm_initrc_exec_t, ajaxterm_var_run_t, alsa_exec_t, alsa_tmp_t, alsa_unit_file_t, alsa_var_run_t, amanda_exec_t, amanda_inetd_exec_t, amanda_log_t, amanda_recover_exec_t, amanda_tmp_t, amanda_unit_file_t, amtu_exec_t, amtu_initrc_exec_t, anaconda_exec_t, anacron_exec_t, anon_inodefs_t, antivirus_exec_t, antivirus_initrc_exec_t, antivirus_log_t, antivirus_tmp_t, antivirus_unit_file_t, antivirus_var_run_t, apcupsd_cgi_script_exec_t, apcupsd_exec_t, apcupsd_initrc_exec_t, apcupsd_log_t, apcupsd_tmp_t, apcupsd_unit_file_t, apcupsd_var_run_t, apm_exec_t, apmd_exec_t, apmd_initrc_exec_t, apmd_log_t, apmd_tmp_t, apmd_unit_file_t, apmd_var_run_t, arpwatch_exec_t, arpwatch_initrc_exec_t, arpwatch_tmp_t, arpwatch_unit_file_t, arpwatch_var_run_t, asterisk_exec_t, asterisk_initrc_exec_t, asterisk_log_t, asterisk_tmp_t, asterisk_var_run_t, audisp_exec_t, audisp_remote_exec_t, audisp_var_run_t, auditadm_sudo_tmp_t, auditctl_exec_t, auditd_exec_t, auditd_initrc_exec_t, auditd_log_t, auditd_tmp_t, auditd_unit_file_t, auditd_var_run_t, auoms_exec_t, auth_cache_t, authconfig_exec_t, automount_exec_t, automount_initrc_exec_t, automount_tmp_t, automount_unit_file_t, automount_var_run_t, avahi_exec_t, avahi_initrc_exec_t, avahi_unit_file_t, avahi_var_run_t, awstats_exec_t, awstats_script_exec_t, awstats_tmp_t, bacula_admin_exec_t, bacula_exec_t, bacula_initrc_exec_t, bacula_log_t, bacula_tmp_t, bacula_unconfined_script_exec_t, bacula_var_run_t, bcfg2_exec_t, bcfg2_initrc_exec_t, bcfg2_unit_file_t, bcfg2_var_run_t, bin_t, bitlbee_exec_t, bitlbee_initrc_exec_t, bitlbee_log_t, bitlbee_tmp_t, bitlbee_var_run_t, blkmapd_exec_t, blkmapd_initrc_exec_t, blkmapd_var_run_t, blktap_exec_t, blktap_var_run_t, blueman_exec_t, blueman_tmp_t, blueman_var_run_t, bluetooth_exec_t, bluetooth_helper_exec_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_initrc_exec_t, bluetooth_tmp_t, bluetooth_unit_file_t, bluetooth_var_run_t, boinc_exec_t, boinc_initrc_exec_t, boinc_log_t, boinc_project_tmp_t, boinc_tmp_t, boinc_unit_file_t, boltd_exec_t, boltd_var_run_t, boot_t, bootloader_exec_t, bootloader_tmp_t, bootloader_var_run_t, brctl_exec_t, brltty_exec_t, brltty_log_t, brltty_unit_file_t, brltty_var_run_t, bugzilla_script_exec_t, bugzilla_tmp_t, bumblebee_exec_t, bumblebee_unit_file_t, bumblebee_var_run_t, cachefilesd_exec_t, cachefilesd_var_run_t, calamaris_exec_t, calamaris_log_t, callweaver_exec_t, callweaver_initrc_exec_t, callweaver_log_t, callweaver_var_run_t, canna_exec_t, canna_initrc_exec_t, canna_log_t, canna_var_run_t, cardctl_exec_t, cardmgr_dev_t, cardmgr_exec_t, cardmgr_var_run_t, ccs_exec_t, ccs_initrc_exec_t, ccs_tmp_t, ccs_var_lib_t, ccs_var_log_t, ccs_var_run_t, cdcc_exec_t, cdcc_tmp_t, cdrecord_exec_t, cert_t, certmaster_exec_t, certmaster_initrc_exec_t, certmaster_var_log_t, certmaster_var_run_t, certmonger_exec_t, certmonger_initrc_exec_t, certmonger_tmp_t, certmonger_unconfined_exec_t, certmonger_unit_file_t, certmonger_var_run_t, certwatch_exec_t, cfengine_execd_exec_t, cfengine_initrc_exec_t, cfengine_log_t, cfengine_monitord_exec_t, cfengine_serverd_exec_t, cgclear_exec_t, cgconfig_exec_t, cgconfig_initrc_exec_t, cgdcbxd_exec_t, cgdcbxd_unit_file_t, cgdcbxd_var_run_t, cgred_exec_t, cgred_initrc_exec_t, cgred_log_t, cgred_var_run_t, cgroup_t, checkpc_exec_t, checkpc_log_t, checkpolicy_exec_t, chfn_exec_t, chkpwd_exec_t, chrome_sandbox_exec_t, chrome_sandbox_nacl_exec_t, chrome_sandbox_tmp_t, chronyc_exec_t, chronyd_exec_t, chronyd_initrc_exec_t, chronyd_keys_t, chronyd_tmp_t, chronyd_unit_file_t, chronyd_var_log_t, chronyd_var_run_t, chroot_exec_t, cifs_t, cinder_api_exec_t, cinder_api_tmp_t, cinder_api_unit_file_t, cinder_backup_exec_t, cinder_backup_tmp_t, cinder_backup_unit_file_t, cinder_log_t, cinder_scheduler_exec_t, cinder_scheduler_tmp_t, cinder_scheduler_unit_file_t, cinder_var_run_t, cinder_volume_exec_t, cinder_volume_tmp_t, cinder_volume_unit_file_t, ciped_exec_t, ciped_initrc_exec_t, clogd_exec_t, clogd_var_run_t, cloud_init_exec_t, cloud_init_tmp_t, cloud_init_unit_file_t, cloud_log_t, cluster_conf_t, cluster_exec_t, cluster_initrc_exec_t, cluster_tmp_t, cluster_unit_file_t, cluster_var_lib_t, cluster_var_log_t, cluster_var_run_t, clvmd_exec_t, clvmd_initrc_exec_t, clvmd_var_run_t, cmirrord_exec_t, cmirrord_initrc_exec_t, cmirrord_var_run_t, cobbler_tmp_t, cobbler_var_log_t, cobblerd_exec_t, cobblerd_initrc_exec_t, cockpit_session_exec_t, cockpit_tmp_t, cockpit_tmpfs_t, cockpit_unit_file_t, cockpit_var_run_t, cockpit_ws_exec_t, collectd_exec_t, collectd_initrc_exec_t, collectd_log_t, collectd_script_exec_t, collectd_script_tmp_t, collectd_unit_file_t, collectd_var_run_t, colord_exec_t, colord_tmp_t, colord_unit_file_t, comsat_exec_t, comsat_tmp_t, comsat_var_run_t, condor_collector_exec_t, condor_initrc_exec_t, condor_log_t, condor_master_exec_t, condor_master_tmp_t, condor_negotiator_exec_t, condor_procd_exec_t, condor_schedd_exec_t, condor_schedd_tmp_t, condor_startd_exec_t, condor_startd_tmp_t, condor_unit_file_t, condor_var_run_t, conman_exec_t, conman_log_t, conman_tmp_t, conman_unconfined_script_exec_t, conman_unit_file_t, conman_var_run_t, conntrackd_exec_t, conntrackd_initrc_exec_t, conntrackd_log_t, conntrackd_unit_file_t, conntrackd_var_run_t, consolehelper_exec_t, consolekit_exec_t, consolekit_log_t, consolekit_unit_file_t, consolekit_var_run_t, couchdb_exec_t, couchdb_initrc_exec_t, couchdb_log_t, couchdb_tmp_t, couchdb_unit_file_t, couchdb_var_run_t, courier_authdaemon_exec_t, courier_exec_t, courier_pcp_exec_t, courier_pop_exec_t, courier_sqwebmail_exec_t, courier_tcpd_exec_t, courier_var_run_t, cpu_online_t, cpucontrol_exec_t, cpufreqselector_exec_t, cpuplug_exec_t, cpuplug_initrc_exec_t, cpuplug_var_run_t, cpuspeed_exec_t, cpuspeed_var_run_t, crack_exec_t, crack_tmp_t, cron_log_t, cron_var_run_t, crond_exec_t, crond_initrc_exec_t, crond_tmp_t, crond_unit_file_t, crond_var_run_t, crontab_exec_t, crontab_tmp_t, ctdbd_exec_t, ctdbd_initrc_exec_t, ctdbd_log_t, ctdbd_tmp_t, ctdbd_var_run_t, cups_pdf_exec_t, cups_pdf_tmp_t, cupsd_config_exec_t, cupsd_config_var_run_t, cupsd_exec_t, cupsd_initrc_exec_t, cupsd_log_t, cupsd_lpd_exec_t, cupsd_lpd_tmp_t, cupsd_lpd_var_run_t, cupsd_tmp_t, cupsd_unit_file_t, cupsd_var_run_t, cvs_exec_t, cvs_initrc
Oct 27 10:28:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:28:37 vmfsppjb006 dbus-daemon[12172]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:28:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:28:38 vmfsppjb006 setroubleshoot[12172]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:28:38 vmfsppjb006 setroubleshoot[12172]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:28:38 vmfsppjb006 platform-python[12172]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:33:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:33:37 vmfsppjb006 dbus-daemon[12466]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:33:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:33:38 vmfsppjb006 setroubleshoot[12466]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:33:38 vmfsppjb006 setroubleshoot[12466]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:33:38 vmfsppjb006 platform-python[12466]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 10:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 10:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 10:39:01 vmfsppjb006 systemd[1]: Started Session 19 of user omsagent.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Reached target Paths.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Starting D-Bus User Message Bus Socket.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Reached target Timers.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Listening on D-Bus User Message Bus Socket.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Reached target Sockets.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Reached target Basic System.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Reached target Default.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Startup finished in 47ms.
Oct 27 10:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 10:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Stopped target Default.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Stopped target Basic System.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Stopped target Sockets.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Stopped target Paths.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Stopped target Timers.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Closed D-Bus User Message Bus Socket.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Reached target Shutdown.
Oct 27 10:39:01 vmfsppjb006 systemd[12774]: Starting Exit the Session...
Oct 27 10:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 12816 (systemctl) with signal SIGKILL.
Oct 27 10:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 10:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 10:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 10:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 10:39:23 vmfsppjb006 python3.6[1683]: 2021-10-27T01:39:23.665740Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 3;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 10:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:39:37 vmfsppjb006 dbus-daemon[12861]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:39:38 vmfsppjb006 setroubleshoot[12861]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:39:38 vmfsppjb006 setroubleshoot[12861]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:39:38 vmfsppjb006 platform-python[12861]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:45:15 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 10:45:16 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 10:45:16 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 10:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:45:37 vmfsppjb006 dbus-daemon[13292]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:45:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:45:38 vmfsppjb006 setroubleshoot[13292]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:45:39 vmfsppjb006 setroubleshoot[13292]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:45:39 vmfsppjb006 platform-python[13292]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Started Session 21 of user omsagent.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Reached target Paths.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Starting D-Bus User Message Bus Socket.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Reached target Timers.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Listening on D-Bus User Message Bus Socket.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Reached target Sockets.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Reached target Basic System.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Reached target Default.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Startup finished in 51ms.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Stopped target Default.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Stopped target Basic System.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Stopped target Sockets.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Closed D-Bus User Message Bus Socket.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Stopped target Timers.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Stopped target Paths.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Reached target Shutdown.
Oct 27 10:54:01 vmfsppjb006 systemd[13769]: Starting Exit the Session...
Oct 27 10:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 13813 (systemctl) with signal SIGKILL.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 10:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 10:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:54:37 vmfsppjb006 dbus-daemon[13852]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:54:38 vmfsppjb006 setroubleshoot[13852]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:54:39 vmfsppjb006 setroubleshoot[13852]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:54:39 vmfsppjb006 platform-python[13852]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 10:55:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 10:55:37 vmfsppjb006 dbus-daemon[13919]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 10:55:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 10:55:38 vmfsppjb006 setroubleshoot[13919]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 10:55:39 vmfsppjb006 setroubleshoot[13919]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 10:55:39 vmfsppjb006 platform-python[13919]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:08:23 vmfsppjb006 python3.6[1683]: 2021-10-27T02:08:23.100563Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 11:08:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:08:37 vmfsppjb006 dbus-daemon[14665]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:08:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:08:38 vmfsppjb006 setroubleshoot[14665]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:08:39 vmfsppjb006 setroubleshoot[14665]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:08:39 vmfsppjb006 platform-python[14665]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 11:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 11:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 11:09:01 vmfsppjb006 systemd[1]: Started Session 23 of user omsagent.
Oct 27 11:09:01 vmfsppjb006 systemd[14697]: Reached target Paths.
Oct 27 11:09:01 vmfsppjb006 systemd[14697]: Starting D-Bus User Message Bus Socket.
Oct 27 11:09:01 vmfsppjb006 systemd[14697]: Reached target Timers.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Listening on D-Bus User Message Bus Socket.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Reached target Sockets.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Reached target Basic System.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Reached target Default.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Startup finished in 47ms.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Stopped target Default.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Stopped target Basic System.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Stopped target Sockets.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Closed D-Bus User Message Bus Socket.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Stopped target Timers.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Stopped target Paths.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Reached target Shutdown.
Oct 27 11:09:02 vmfsppjb006 systemd[14697]: Starting Exit the Session...
Oct 27 11:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 14740 (systemctl) with signal SIGKILL.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 11:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 11:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 11:09:18 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 11:09:19 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 11:09:19 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 11:09:29 vmfsppjb006 python3.6[1683]: 2021-10-27T02:09:29.340897Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 4;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 11:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:09:37 vmfsppjb006 dbus-daemon[14871]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:09:38 vmfsppjb006 setroubleshoot[14871]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:09:39 vmfsppjb006 setroubleshoot[14871]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:09:39 vmfsppjb006 platform-python[14871]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:10:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:10:37 vmfsppjb006 dbus-daemon[14932]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:10:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:10:38 vmfsppjb006 setroubleshoot[14932]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:10:39 vmfsppjb006 setroubleshoot[14932]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:10:39 vmfsppjb006 platform-python[14932]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:15:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:15:37 vmfsppjb006 dbus-daemon[15224]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:15:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:15:38 vmfsppjb006 setroubleshoot[15224]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:15:39 vmfsppjb006 setroubleshoot[15224]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:15:39 vmfsppjb006 platform-python[15224]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:18:14 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 11:18:15 vmfsppjb006 dnf[15372]: Metadata cache refreshed recently.
Oct 27 11:18:15 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 11:23:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:23:37 vmfsppjb006 dbus-daemon[15674]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:23:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:23:37 vmfsppjb006 setroubleshoot[15674]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:23:38 vmfsppjb006 setroubleshoot[15674]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:23:38 vmfsppjb006 platform-python[15674]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 11:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 11:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 11:24:01 vmfsppjb006 systemd[1]: Started Session 25 of user omsagent.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Reached target Paths.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Reached target Timers.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Starting D-Bus User Message Bus Socket.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Listening on D-Bus User Message Bus Socket.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Reached target Sockets.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Reached target Basic System.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Reached target Default.
Oct 27 11:24:01 vmfsppjb006 systemd[15707]: Startup finished in 75ms.
Oct 27 11:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 11:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Stopped target Default.
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Stopped target Basic System.
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Stopped target Paths.
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Stopped target Timers.
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Stopped target Sockets.
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Closed D-Bus User Message Bus Socket.
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Reached target Shutdown.
Oct 27 11:24:02 vmfsppjb006 systemd[15707]: Starting Exit the Session...
Oct 27 11:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 15755 (systemctl) with signal SIGKILL.
Oct 27 11:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 11:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 11:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 11:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 11:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:24:37 vmfsppjb006 dbus-daemon[15798]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:24:37 vmfsppjb006 setroubleshoot[15798]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:24:38 vmfsppjb006 setroubleshoot[15798]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:24:38 vmfsppjb006 platform-python[15798]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Started Session 27 of user omsagent.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Starting D-Bus User Message Bus Socket.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Reached target Timers.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Reached target Paths.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Listening on D-Bus User Message Bus Socket.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Reached target Sockets.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Reached target Basic System.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Reached target Default.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Startup finished in 46ms.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Stopped target Default.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Stopped target Basic System.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Stopped target Sockets.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Closed D-Bus User Message Bus Socket.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Stopped target Paths.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Stopped target Timers.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Reached target Shutdown.
Oct 27 11:39:01 vmfsppjb006 systemd[16612]: Starting Exit the Session...
Oct 27 11:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 16654 (systemctl) with signal SIGKILL.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 11:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Started Session c1 of user root.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Starting D-Bus User Message Bus Socket.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Reached target Paths.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Reached target Timers.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Listening on D-Bus User Message Bus Socket.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Reached target Sockets.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Reached target Basic System.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Reached target Default.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Startup finished in 47ms.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Stopped target Default.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Stopped target Basic System.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Stopped target Sockets.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Closed D-Bus User Message Bus Socket.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Stopped target Timers.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Stopped target Paths.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Reached target Shutdown.
Oct 27 11:39:27 vmfsppjb006 systemd[16756]: Starting Exit the Session...
Oct 27 11:39:27 vmfsppjb006 systemd[1]: user@0.service: Killing process 16791 (systemctl) with signal SIGKILL.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 27 11:39:27 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 27 11:39:35 vmfsppjb006 python3.6[1683]: 2021-10-27T02:39:35.060344Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 5;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 11:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:39:37 vmfsppjb006 dbus-daemon[16820]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:39:38 vmfsppjb006 setroubleshoot[16820]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:39:38 vmfsppjb006 setroubleshoot[16820]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:39:38 vmfsppjb006 platform-python[16820]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:40:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:40:37 vmfsppjb006 dbus-daemon[16889]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:40:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:40:38 vmfsppjb006 setroubleshoot[16889]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:40:38 vmfsppjb006 setroubleshoot[16889]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:40:38 vmfsppjb006 platform-python[16889]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:41:34 vmfsppjb006 systemd[1]: Started Session 30 of user finsrvpf.
Oct 27 11:41:34 vmfsppjb006 systemd-logind[931]: New session 30 of user finsrvpf.
Oct 27 11:41:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:41:37 vmfsppjb006 dbus-daemon[16979]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:41:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:41:38 vmfsppjb006 setroubleshoot[16979]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:41:38 vmfsppjb006 setroubleshoot[16979]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:41:38 vmfsppjb006 platform-python[16979]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:41:40 vmfsppjb006 su[16987]: (to jobuser) finsrvpf on pts/2
Oct 27 11:42:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:42:37 vmfsppjb006 dbus-daemon[17073]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:42:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:42:38 vmfsppjb006 setroubleshoot[17073]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:42:38 vmfsppjb006 setroubleshoot[17073]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:42:38 vmfsppjb006 platform-python[17073]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:44:01 vmfsppjb006 powershell[17157]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 11:44:02 vmfsppjb006 powershell[17157]: (7.1.4:8:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 17157 in AppDomain: None.
Oct 27 11:44:02 vmfsppjb006 systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 17168 (.NET ThreadPool)
Oct 27 11:44:02 vmfsppjb006 systemd[1]: Mounting Arbitrary Executable File Formats File System...
Oct 27 11:44:02 vmfsppjb006 systemd[1]: Mounted Arbitrary Executable File Formats File System.
Oct 27 11:44:02 vmfsppjb006 powershell[17157]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 34c21b10-4113-41ba-9c2a-e370b35ebef5#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:04 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:05 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:05 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:05 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:05 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:05 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:16 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 27 11:44:16 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012wHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 06189383-9673-40ef-b239-f6a1b57f10a6#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 11:44:17 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 10293737-9b2d-4132-b2c6-c4d0fe771513#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 11:44:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:44:37 vmfsppjb006 dbus-daemon[17238]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:44:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:44:38 vmfsppjb006 setroubleshoot[17238]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:44:38 vmfsppjb006 setroubleshoot[17238]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:44:38 vmfsppjb006 platform-python[17238]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:44:39 vmfsppjb006 powershell[17157]: (7.1.4:A:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06b66e9d-83ed-46db-ae10-b8e4ee21f065#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 20#012        Engine Version = 7.1.4#012        Runspace ID = 48925401-1896-4c24-8694-aa153a6b04e8#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 512#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:44:39 vmfsppjb006 powershell[17157]: (7.1.4:8:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 17157 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 11:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:45:37 vmfsppjb006 dbus-daemon[17304]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:45:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:45:38 vmfsppjb006 setroubleshoot[17304]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:45:38 vmfsppjb006 setroubleshoot[17304]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:45:38 vmfsppjb006 platform-python[17304]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:46:32 vmfsppjb006 powershell[17374]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 11:46:32 vmfsppjb006 powershell[17374]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 17374 in AppDomain: None.
Oct 27 11:46:32 vmfsppjb006 powershell[17374]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 5d979312-312d-41f9-b25c-a61aea2fab8a#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:33 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:44 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 27 11:46:44 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 4d6bf88e-4d90-45c9-9e3e-19f7525c950a#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 11:46:44 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: d2666180-c926-477b-9cf1-5c88f84c2230#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 11:46:46 vmfsppjb006 powershell[17374]: (7.1.4:9:80) [Command_Health:ExecutePipeline.Exception.Warning] Error Message = System error.#012#012#012Context:#012        Severity = Warning#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 94ac2e19-ff22-4d5a-b965-7c54bc7071b6#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 1257c3a7-1fbc-4307-86de-f9eec7bcb941#012        Pipeline ID = 1#012        Command Name = #012        Command Type = #012        Script Name = #012        Command Path = #012        Sequence Number = 472#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 11:46:46 vmfsppjb006 powershell[17374]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 17374 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 11:47:44 vmfsppjb006 powershell[17457]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 11:47:44 vmfsppjb006 powershell[17457]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 17457 in AppDomain: None.
Oct 27 11:47:44 vmfsppjb006 powershell[17457]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 11:48:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:48:37 vmfsppjb006 dbus-daemon[17532]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:48:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:48:38 vmfsppjb006 setroubleshoot[17532]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:48:38 vmfsppjb006 setroubleshoot[17532]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:48:38 vmfsppjb006 platform-python[17532]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:51:37 vmfsppjb006 powershell[17457]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 17457 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 11:51:45 vmfsppjb006 powershell[17748]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 11:51:45 vmfsppjb006 powershell[17748]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 17748 in AppDomain: None.
Oct 27 11:51:45 vmfsppjb006 powershell[17748]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 11:51:45 vmfsppjb006 powershell[17748]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 17748 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 11:52:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:52:37 vmfsppjb006 dbus-daemon[17817]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:52:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:52:38 vmfsppjb006 setroubleshoot[17817]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:52:39 vmfsppjb006 setroubleshoot[17817]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:52:39 vmfsppjb006 platform-python[17817]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 11:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 11:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 11:54:01 vmfsppjb006 systemd[1]: Started Session 31 of user omsagent.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Starting D-Bus User Message Bus Socket.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Reached target Timers.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Reached target Paths.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Listening on D-Bus User Message Bus Socket.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Reached target Sockets.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Reached target Basic System.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Reached target Default.
Oct 27 11:54:01 vmfsppjb006 systemd[17904]: Startup finished in 48ms.
Oct 27 11:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 11:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Stopped target Default.
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Stopped target Basic System.
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Stopped target Timers.
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Stopped target Sockets.
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Stopped target Paths.
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Closed D-Bus User Message Bus Socket.
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Reached target Shutdown.
Oct 27 11:54:02 vmfsppjb006 systemd[17904]: Starting Exit the Session...
Oct 27 11:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 17946 (systemctl) with signal SIGKILL.
Oct 27 11:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 11:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 11:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 11:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 11:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 11:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 11:54:37 vmfsppjb006 dbus-daemon[17985]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 11:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 11:54:38 vmfsppjb006 setroubleshoot[17985]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 11:54:39 vmfsppjb006 setroubleshoot[17985]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 11:54:39 vmfsppjb006 platform-python[17985]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 11:57:22 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 11:57:23 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 11:57:23 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 18555 in AppDomain: None.
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: a1729984-d494-4b8e-95db-11db62d256d4#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:02:58 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6508390-be2a-43df-a8df-451886cc8d6e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001#012        Engine Version = 7.1.4#012        Runspace ID = 25e8938f-2b38-4c8c-a2b2-1bbbe2d996be#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 12:03:11 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 27 12:03:11 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012zvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTH
Oct 27 12:03:11 vmfsppjb006 powershell[18555]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 5812c726-d40c-4295-93db-607f70cfd1f0#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 12:03:12 vmfsppjb006 powershell[18555]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 18555 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 12:03:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:03:37 vmfsppjb006 dbus-daemon[18626]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:03:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:03:38 vmfsppjb006 setroubleshoot[18626]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:03:39 vmfsppjb006 setroubleshoot[18626]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:03:39 vmfsppjb006 platform-python[18626]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:08:24 vmfsppjb006 python3.6[1683]: 2021-10-27T03:08:24.427049Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Started Session 33 of user omsagent.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Starting D-Bus User Message Bus Socket.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Reached target Paths.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Reached target Timers.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Listening on D-Bus User Message Bus Socket.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Reached target Sockets.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Reached target Basic System.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Reached target Default.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Startup finished in 48ms.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Stopped target Default.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Stopped target Basic System.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Stopped target Sockets.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Stopped target Timers.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Closed D-Bus User Message Bus Socket.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Stopped target Paths.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Reached target Shutdown.
Oct 27 12:09:01 vmfsppjb006 systemd[18932]: Starting Exit the Session...
Oct 27 12:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 18974 (systemctl) with signal SIGKILL.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 12:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 12:09:36 vmfsppjb006 python3.6[1683]: 2021-10-27T03:09:36.707897Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 6;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 12:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:09:37 vmfsppjb006 dbus-daemon[19019]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:09:38 vmfsppjb006 setroubleshoot[19019]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:09:39 vmfsppjb006 setroubleshoot[19019]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:09:39 vmfsppjb006 platform-python[19019]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:11:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:11:37 vmfsppjb006 dbus-daemon[19144]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:11:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:11:38 vmfsppjb006 setroubleshoot[19144]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:11:39 vmfsppjb006 setroubleshoot[19144]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:11:39 vmfsppjb006 platform-python[19144]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:18:18 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 12:18:19 vmfsppjb006 dnf[19521]: packages-microsoft-com-prod                      14 kB/s | 3.0 kB     00:00
Oct 27 12:18:19 vmfsppjb006 dnf[19521]: MySQL 8.0 Community Server                      125 kB/s | 2.6 kB     00:00
Oct 27 12:18:19 vmfsppjb006 dnf[19521]: MySQL Connectors Community                      122 kB/s | 2.6 kB     00:00
Oct 27 12:18:19 vmfsppjb006 dnf[19521]: MySQL Tools Community                           281 kB/s | 2.6 kB     00:00
Oct 27 12:18:20 vmfsppjb006 dnf[19521]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  3.8 kB/s | 2.4 kB     00:00
Oct 27 12:18:21 vmfsppjb006 dnf[19521]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.9 kB/s | 2.8 kB     00:00
Oct 27 12:18:21 vmfsppjb006 dnf[19521]: Microsoft Azure RPMs for RHEL8 Extended Update  7.1 kB/s | 2.1 kB     00:00
Oct 27 12:18:22 vmfsppjb006 dnf[19521]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 27 12:18:22 vmfsppjb006 dnf[19521]: Zabbix Official Repository non-supported - x86_  14 kB/s | 3.0 kB     00:00
Oct 27 12:18:23 vmfsppjb006 dnf[19521]: Metadata cache created.
Oct 27 12:18:23 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 12:18:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:18:37 vmfsppjb006 dbus-daemon[19554]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:18:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:18:38 vmfsppjb006 setroubleshoot[19554]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:18:39 vmfsppjb006 setroubleshoot[19554]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:18:39 vmfsppjb006 platform-python[19554]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:21:25 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 12:21:26 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 12:21:26 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 12:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 12:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 12:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 12:24:01 vmfsppjb006 systemd[1]: Started Session 35 of user omsagent.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Reached target Timers.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Reached target Paths.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Starting D-Bus User Message Bus Socket.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Listening on D-Bus User Message Bus Socket.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Reached target Sockets.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Reached target Basic System.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Reached target Default.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Startup finished in 46ms.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Stopped target Default.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Stopped target Basic System.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Stopped target Sockets.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Closed D-Bus User Message Bus Socket.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Stopped target Timers.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Stopped target Paths.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Reached target Shutdown.
Oct 27 12:24:02 vmfsppjb006 systemd[19942]: Starting Exit the Session...
Oct 27 12:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 19984 (systemctl) with signal SIGKILL.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 12:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 12:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 12:24:38 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:24:38 vmfsppjb006 dbus-daemon[20023]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:24:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:24:38 vmfsppjb006 setroubleshoot[20023]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:24:39 vmfsppjb006 setroubleshoot[20023]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:24:39 vmfsppjb006 platform-python[20023]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:25:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:25:37 vmfsppjb006 dbus-daemon[20093]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:25:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:25:37 vmfsppjb006 setroubleshoot[20093]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:25:38 vmfsppjb006 setroubleshoot[20093]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:25:38 vmfsppjb006 platform-python[20093]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 12:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 12:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 12:39:01 vmfsppjb006 systemd[1]: Started Session 37 of user omsagent.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Starting D-Bus User Message Bus Socket.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Reached target Paths.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Reached target Timers.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Listening on D-Bus User Message Bus Socket.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Reached target Sockets.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Reached target Basic System.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Reached target Default.
Oct 27 12:39:01 vmfsppjb006 systemd[20847]: Startup finished in 47ms.
Oct 27 12:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 12:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Stopped target Default.
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Stopped target Basic System.
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Stopped target Paths.
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Stopped target Timers.
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Stopped target Sockets.
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Closed D-Bus User Message Bus Socket.
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Reached target Shutdown.
Oct 27 12:39:02 vmfsppjb006 systemd[20847]: Starting Exit the Session...
Oct 27 12:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 20890 (systemctl) with signal SIGKILL.
Oct 27 12:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 12:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 12:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 12:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 12:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:39:37 vmfsppjb006 dbus-daemon[20943]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:39:37 vmfsppjb006 python3.6[1683]: 2021-10-27T03:39:37.667790Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 7;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 12:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:39:38 vmfsppjb006 setroubleshoot[20943]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:39:38 vmfsppjb006 setroubleshoot[20943]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:39:38 vmfsppjb006 platform-python[20943]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:45:28 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 12:45:29 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 12:45:29 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 12:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:45:37 vmfsppjb006 dbus-daemon[21372]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:45:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:45:38 vmfsppjb006 setroubleshoot[21372]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:45:38 vmfsppjb006 setroubleshoot[21372]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:45:38 vmfsppjb006 platform-python[21372]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Started Session 39 of user omsagent.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Reached target Paths.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Reached target Timers.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Starting D-Bus User Message Bus Socket.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Listening on D-Bus User Message Bus Socket.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Reached target Sockets.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Reached target Basic System.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Reached target Default.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Startup finished in 45ms.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Stopped target Default.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Stopped target Basic System.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Stopped target Sockets.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Closed D-Bus User Message Bus Socket.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Stopped target Timers.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Stopped target Paths.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Reached target Shutdown.
Oct 27 12:54:01 vmfsppjb006 systemd[21850]: Starting Exit the Session...
Oct 27 12:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 21892 (systemctl) with signal SIGKILL.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 12:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 12:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:54:37 vmfsppjb006 dbus-daemon[21942]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:54:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:54:38 vmfsppjb006 setroubleshoot[21942]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:54:38 vmfsppjb006 setroubleshoot[21942]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:54:38 vmfsppjb006 platform-python[21942]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 12:55:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 12:55:37 vmfsppjb006 dbus-daemon[21998]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 12:55:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 12:55:38 vmfsppjb006 setroubleshoot[21998]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 12:55:38 vmfsppjb006 setroubleshoot[21998]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 12:55:38 vmfsppjb006 platform-python[21998]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:08:24 vmfsppjb006 python3.6[1683]: 2021-10-27T04:08:24.881267Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 13:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 13:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 13:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 13:09:01 vmfsppjb006 systemd[1]: Started Session 41 of user omsagent.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Reached target Paths.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Reached target Timers.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Starting D-Bus User Message Bus Socket.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Listening on D-Bus User Message Bus Socket.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Reached target Sockets.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Reached target Basic System.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Reached target Default.
Oct 27 13:09:01 vmfsppjb006 systemd[22776]: Startup finished in 48ms.
Oct 27 13:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 13:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Stopped target Default.
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Stopped target Basic System.
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Stopped target Paths.
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Stopped target Timers.
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Stopped target Sockets.
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Closed D-Bus User Message Bus Socket.
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Reached target Shutdown.
Oct 27 13:09:02 vmfsppjb006 systemd[22776]: Starting Exit the Session...
Oct 27 13:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 22821 (systemctl) with signal SIGKILL.
Oct 27 13:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 13:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 13:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 13:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 13:09:31 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 13:09:32 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 13:09:32 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 13:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:09:37 vmfsppjb006 dbus-daemon[22941]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:09:38 vmfsppjb006 setroubleshoot[22941]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:09:39 vmfsppjb006 setroubleshoot[22941]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:09:39 vmfsppjb006 platform-python[22941]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:09:43 vmfsppjb006 python3.6[1683]: 2021-10-27T04:09:43.177612Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 8;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 13:10:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:10:37 vmfsppjb006 dbus-daemon[23014]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:10:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:10:38 vmfsppjb006 setroubleshoot[23014]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:10:39 vmfsppjb006 setroubleshoot[23014]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:10:39 vmfsppjb006 platform-python[23014]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:18:25 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 13:18:26 vmfsppjb006 dnf[23447]: Metadata cache refreshed recently.
Oct 27 13:18:26 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 13:18:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:18:37 vmfsppjb006 dbus-daemon[23467]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:18:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:18:38 vmfsppjb006 setroubleshoot[23467]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:18:39 vmfsppjb006 setroubleshoot[23467]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:18:39 vmfsppjb006 platform-python[23467]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Started Session 43 of user omsagent.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Reached target Paths.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Reached target Timers.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Starting D-Bus User Message Bus Socket.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Listening on D-Bus User Message Bus Socket.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Reached target Sockets.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Reached target Basic System.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Reached target Default.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Startup finished in 44ms.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Stopped target Default.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Stopped target Basic System.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Stopped target Paths.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Stopped target Timers.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Stopped target Sockets.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Closed D-Bus User Message Bus Socket.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Reached target Shutdown.
Oct 27 13:24:01 vmfsppjb006 systemd[23779]: Starting Exit the Session...
Oct 27 13:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 23822 (systemctl) with signal SIGKILL.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 13:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 13:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:24:37 vmfsppjb006 dbus-daemon[23863]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:24:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:24:38 vmfsppjb006 setroubleshoot[23863]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:24:39 vmfsppjb006 setroubleshoot[23863]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:24:39 vmfsppjb006 platform-python[23863]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:33:34 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 13:33:35 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 13:33:35 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 13:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 13:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 13:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 13:39:01 vmfsppjb006 systemd[1]: Started Session 45 of user omsagent.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Reached target Paths.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Reached target Timers.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Starting D-Bus User Message Bus Socket.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Listening on D-Bus User Message Bus Socket.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Reached target Sockets.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Reached target Basic System.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Reached target Default.
Oct 27 13:39:01 vmfsppjb006 systemd[24772]: Startup finished in 50ms.
Oct 27 13:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Stopped target Default.
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Stopped target Basic System.
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Stopped target Sockets.
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Closed D-Bus User Message Bus Socket.
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Stopped target Paths.
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Reached target Shutdown.
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Starting Exit the Session...
Oct 27 13:39:02 vmfsppjb006 systemd[24772]: Stopped target Timers.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 24815 (systemctl) with signal SIGKILL.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 13:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 13:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 13:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:39:37 vmfsppjb006 dbus-daemon[24860]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:39:37 vmfsppjb006 setroubleshoot[24860]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:39:38 vmfsppjb006 setroubleshoot[24860]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:39:38 vmfsppjb006 platform-python[24860]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:39:47 vmfsppjb006 python3.6[1683]: 2021-10-27T04:39:47.899679Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 9;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 13:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:45:37 vmfsppjb006 dbus-daemon[25197]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:45:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:45:37 vmfsppjb006 setroubleshoot[25197]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:45:38 vmfsppjb006 setroubleshoot[25197]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:45:38 vmfsppjb006 platform-python[25197]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Started Session 47 of user omsagent.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Starting D-Bus User Message Bus Socket.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Reached target Paths.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Reached target Timers.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Listening on D-Bus User Message Bus Socket.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Reached target Sockets.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Reached target Basic System.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Reached target Default.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Startup finished in 47ms.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Stopped target Default.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Stopped target Basic System.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Stopped target Timers.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Stopped target Sockets.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Closed D-Bus User Message Bus Socket.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Stopped target Paths.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Reached target Shutdown.
Oct 27 13:54:01 vmfsppjb006 systemd[25682]: Starting Exit the Session...
Oct 27 13:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 25724 (systemctl) with signal SIGKILL.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 13:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 13:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:54:37 vmfsppjb006 dbus-daemon[25766]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:54:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:54:38 vmfsppjb006 setroubleshoot[25766]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:54:38 vmfsppjb006 setroubleshoot[25766]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:54:38 vmfsppjb006 platform-python[25766]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 13:56:37 vmfsppjb006 powershell[25896]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 13:56:37 vmfsppjb006 powershell[25896]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 25896 in AppDomain: None.
Oct 27 13:56:37 vmfsppjb006 powershell[25896]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 13:56:39 vmfsppjb006 powershell[25896]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 25896 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 13:57:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 13:57:37 vmfsppjb006 dbus-daemon[25962]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 13:57:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 13:57:38 vmfsppjb006 setroubleshoot[25962]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 13:57:38 vmfsppjb006 setroubleshoot[25962]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 13:57:38 vmfsppjb006 platform-python[25962]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:01:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:01:37 vmfsppjb006 dbus-daemon[26207]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:01:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:01:38 vmfsppjb006 setroubleshoot[26207]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:01:38 vmfsppjb006 setroubleshoot[26207]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:01:38 vmfsppjb006 platform-python[26207]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Started Session c2 of user root.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Reached target Paths.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Reached target Timers.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Starting D-Bus User Message Bus Socket.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Listening on D-Bus User Message Bus Socket.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Reached target Sockets.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Reached target Basic System.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Reached target Default.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Startup finished in 52ms.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Stopped target Default.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Stopped target Basic System.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Stopped target Timers.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Stopped target Sockets.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Stopped target Paths.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Closed D-Bus User Message Bus Socket.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Reached target Shutdown.
Oct 27 14:03:38 vmfsppjb006 systemd[26398]: Starting Exit the Session...
Oct 27 14:03:38 vmfsppjb006 systemd[1]: user@0.service: Killing process 26433 (systemctl) with signal SIGKILL.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 27 14:03:38 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 27 14:04:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:04:37 vmfsppjb006 dbus-daemon[26510]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:04:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:04:38 vmfsppjb006 setroubleshoot[26510]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:04:38 vmfsppjb006 setroubleshoot[26510]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:04:38 vmfsppjb006 platform-python[26510]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:05:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:05:37 vmfsppjb006 dbus-daemon[26568]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:05:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:05:38 vmfsppjb006 setroubleshoot[26568]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:05:38 vmfsppjb006 setroubleshoot[26568]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:05:38 vmfsppjb006 platform-python[26568]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:08:29 vmfsppjb006 python3.6[1683]: 2021-10-27T05:08:29.043757Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 14:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 14:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 14:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 14:09:01 vmfsppjb006 systemd[1]: Started Session 50 of user omsagent.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Starting D-Bus User Message Bus Socket.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Reached target Paths.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Reached target Timers.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Listening on D-Bus User Message Bus Socket.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Reached target Sockets.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Reached target Basic System.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Reached target Default.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Startup finished in 49ms.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Stopped target Default.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Stopped target Basic System.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Stopped target Sockets.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Closed D-Bus User Message Bus Socket.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Stopped target Paths.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Reached target Shutdown.
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Starting Exit the Session...
Oct 27 14:09:02 vmfsppjb006 systemd[26767]: Stopped target Timers.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 26810 (systemctl) with signal SIGKILL.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 14:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 14:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 14:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:09:37 vmfsppjb006 dbus-daemon[26852]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:09:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:09:38 vmfsppjb006 setroubleshoot[26852]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:09:38 vmfsppjb006 setroubleshoot[26852]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:09:38 vmfsppjb006 platform-python[26852]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:09:53 vmfsppjb006 python3.6[1683]: 2021-10-27T05:09:53.352272Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 10;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 14:14:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:14:37 vmfsppjb006 dbus-daemon[27149]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:14:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:14:38 vmfsppjb006 setroubleshoot[27149]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:14:39 vmfsppjb006 setroubleshoot[27149]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:14:39 vmfsppjb006 platform-python[27149]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:18:31 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 14:18:31 vmfsppjb006 dnf[27373]: Metadata cache refreshed recently.
Oct 27 14:18:31 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 14:20:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:20:37 vmfsppjb006 dbus-daemon[27503]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:20:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:20:38 vmfsppjb006 setroubleshoot[27503]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:20:39 vmfsppjb006 setroubleshoot[27503]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:20:39 vmfsppjb006 platform-python[27503]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:21:38 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 14:21:39 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 14:21:39 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 14:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 14:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 14:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 14:24:01 vmfsppjb006 systemd[1]: Started Session 52 of user omsagent.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Reached target Paths.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Reached target Timers.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Starting D-Bus User Message Bus Socket.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Listening on D-Bus User Message Bus Socket.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Reached target Sockets.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Reached target Basic System.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Reached target Default.
Oct 27 14:24:01 vmfsppjb006 systemd[27777]: Startup finished in 46ms.
Oct 27 14:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 14:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Stopped target Default.
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Stopped target Basic System.
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Stopped target Paths.
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Stopped target Timers.
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Stopped target Sockets.
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Closed D-Bus User Message Bus Socket.
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Reached target Shutdown.
Oct 27 14:24:02 vmfsppjb006 systemd[27777]: Starting Exit the Session...
Oct 27 14:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 27818 (systemctl) with signal SIGKILL.
Oct 27 14:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 14:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 14:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 14:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 14:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:24:37 vmfsppjb006 dbus-daemon[27866]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:24:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:24:38 vmfsppjb006 setroubleshoot[27866]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:24:39 vmfsppjb006 setroubleshoot[27866]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:24:39 vmfsppjb006 platform-python[27866]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:37:05 vmfsppjb006 powershell[28559]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:37:05 vmfsppjb006 powershell[28559]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 28559 in AppDomain: None.
Oct 27 14:37:05 vmfsppjb006 powershell[28559]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:38:42 vmfsppjb006 powershell[28672]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:38:42 vmfsppjb006 powershell[28672]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 28672 in AppDomain: None.
Oct 27 14:38:42 vmfsppjb006 powershell[28672]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:38:49 vmfsppjb006 powershell[28672]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 28672 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Started Session 54 of user omsagent.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Reached target Timers.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Reached target Paths.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Starting D-Bus User Message Bus Socket.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Listening on D-Bus User Message Bus Socket.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Reached target Sockets.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Reached target Basic System.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Reached target Default.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Startup finished in 47ms.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Stopped target Default.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Stopped target Basic System.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Stopped target Sockets.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Closed D-Bus User Message Bus Socket.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Stopped target Paths.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Reached target Shutdown.
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Starting Exit the Session...
Oct 27 14:39:01 vmfsppjb006 systemd[28711]: Stopped target Timers.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 28753 (systemctl) with signal SIGKILL.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 14:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 14:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:39:37 vmfsppjb006 dbus-daemon[28802]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:39:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:39:38 vmfsppjb006 setroubleshoot[28802]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:39:39 vmfsppjb006 setroubleshoot[28802]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:39:39 vmfsppjb006 platform-python[28802]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:39:48 vmfsppjb006 powershell[28822]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:39:48 vmfsppjb006 powershell[28822]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 28822 in AppDomain: None.
Oct 27 14:39:48 vmfsppjb006 powershell[28822]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:39:51 vmfsppjb006 powershell[28822]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 28822 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 14:39:59 vmfsppjb006 python3.6[1683]: 2021-10-27T05:39:59.231525Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 11;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 14:41:31 vmfsppjb006 powershell[28943]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:41:31 vmfsppjb006 powershell[28943]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 28943 in AppDomain: None.
Oct 27 14:41:31 vmfsppjb006 powershell[28943]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:41:33 vmfsppjb006 powershell[28943]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 28943 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 14:41:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:41:37 vmfsppjb006 dbus-daemon[28964]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:41:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:41:38 vmfsppjb006 setroubleshoot[28964]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:41:39 vmfsppjb006 setroubleshoot[28964]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:41:39 vmfsppjb006 platform-python[28964]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:41:47 vmfsppjb006 powershell[28997]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:41:47 vmfsppjb006 powershell[28997]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 28997 in AppDomain: None.
Oct 27 14:41:47 vmfsppjb006 powershell[28997]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:41:48 vmfsppjb006 powershell[28997]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 28997 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 14:43:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:43:37 vmfsppjb006 dbus-daemon[29108]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:43:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:43:38 vmfsppjb006 setroubleshoot[29108]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:43:39 vmfsppjb006 setroubleshoot[29108]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:43:39 vmfsppjb006 platform-python[29108]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:45:41 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 14:45:42 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 14:45:42 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 14:46:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:46:37 vmfsppjb006 dbus-daemon[29364]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:46:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:46:38 vmfsppjb006 setroubleshoot[29364]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:46:39 vmfsppjb006 setroubleshoot[29364]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:46:39 vmfsppjb006 platform-python[29364]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 14:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 14:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 14:54:01 vmfsppjb006 systemd[1]: Started Session 56 of user omsagent.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Reached target Timers.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Reached target Paths.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Starting D-Bus User Message Bus Socket.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Listening on D-Bus User Message Bus Socket.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Reached target Sockets.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Reached target Basic System.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Reached target Default.
Oct 27 14:54:01 vmfsppjb006 systemd[29797]: Startup finished in 45ms.
Oct 27 14:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 14:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Stopped target Default.
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Stopped target Basic System.
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Stopped target Paths.
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Stopped target Timers.
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Stopped target Sockets.
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Closed D-Bus User Message Bus Socket.
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Reached target Shutdown.
Oct 27 14:54:02 vmfsppjb006 systemd[29797]: Starting Exit the Session...
Oct 27 14:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 29839 (systemctl) with signal SIGKILL.
Oct 27 14:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 14:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 14:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 14:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 14:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 14:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:54:37 vmfsppjb006 dbus-daemon[29874]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:54:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:54:37 vmfsppjb006 setroubleshoot[29874]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:54:38 vmfsppjb006 setroubleshoot[29874]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:54:38 vmfsppjb006 platform-python[29874]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 14:55:37 vmfsppjb006 powershell[29943]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:55:37 vmfsppjb006 powershell[29943]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 29943 in AppDomain: None.
Oct 27 14:55:37 vmfsppjb006 powershell[29943]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:55:37 vmfsppjb006 powershell[29943]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 29943 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 14:55:41 vmfsppjb006 powershell[29964]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:55:41 vmfsppjb006 powershell[29964]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 29964 in AppDomain: None.
Oct 27 14:55:41 vmfsppjb006 powershell[29964]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:55:48 vmfsppjb006 powershell[29964]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 29964 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 14:55:51 vmfsppjb006 powershell[29992]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 14:55:51 vmfsppjb006 powershell[29992]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 29992 in AppDomain: None.
Oct 27 14:55:51 vmfsppjb006 powershell[29992]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 14:56:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 14:56:37 vmfsppjb006 dbus-daemon[30055]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 14:56:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 14:56:37 vmfsppjb006 setroubleshoot[30055]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 14:56:38 vmfsppjb006 setroubleshoot[30055]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 14:56:38 vmfsppjb006 platform-python[30055]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:00:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:00:37 vmfsppjb006 dbus-daemon[30317]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:00:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:00:38 vmfsppjb006 setroubleshoot[30317]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:00:38 vmfsppjb006 setroubleshoot[30317]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:00:38 vmfsppjb006 platform-python[30317]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:05:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:05:37 vmfsppjb006 dbus-daemon[30652]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:05:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:05:38 vmfsppjb006 setroubleshoot[30652]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:05:38 vmfsppjb006 setroubleshoot[30652]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:05:38 vmfsppjb006 platform-python[30652]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:08:34 vmfsppjb006 python3.6[1683]: 2021-10-27T06:08:34.573406Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Started Session 58 of user omsagent.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Reached target Paths.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Reached target Timers.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Starting D-Bus User Message Bus Socket.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Listening on D-Bus User Message Bus Socket.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Reached target Sockets.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Reached target Basic System.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Reached target Default.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Startup finished in 48ms.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Stopped target Default.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Stopped target Basic System.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Stopped target Timers.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Stopped target Sockets.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Closed D-Bus User Message Bus Socket.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Stopped target Paths.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Reached target Shutdown.
Oct 27 15:09:01 vmfsppjb006 systemd[30889]: Starting Exit the Session...
Oct 27 15:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 30932 (systemctl) with signal SIGKILL.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 15:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 15:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:09:37 vmfsppjb006 dbus-daemon[30970]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:09:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:09:38 vmfsppjb006 setroubleshoot[30970]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:09:38 vmfsppjb006 setroubleshoot[30970]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:09:38 vmfsppjb006 platform-python[30970]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:09:44 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 15:09:45 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 15:09:45 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 15:10:04 vmfsppjb006 python3.6[1683]: 2021-10-27T06:10:04.896793Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 12;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 15:10:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:10:37 vmfsppjb006 dbus-daemon[31133]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:10:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:10:38 vmfsppjb006 setroubleshoot[31133]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:10:38 vmfsppjb006 setroubleshoot[31133]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:10:38 vmfsppjb006 platform-python[31133]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:11:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:11:37 vmfsppjb006 dbus-daemon[31204]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:11:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:11:38 vmfsppjb006 setroubleshoot[31204]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:11:38 vmfsppjb006 setroubleshoot[31204]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:11:38 vmfsppjb006 platform-python[31204]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:18:38 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 15:18:39 vmfsppjb006 dnf[31652]: packages-microsoft-com-prod                      13 kB/s | 3.0 kB     00:00
Oct 27 15:18:39 vmfsppjb006 dnf[31652]: MySQL 8.0 Community Server                       52 kB/s | 2.6 kB     00:00
Oct 27 15:18:39 vmfsppjb006 dnf[31652]: MySQL Connectors Community                       85 kB/s | 2.6 kB     00:00
Oct 27 15:18:39 vmfsppjb006 dnf[31652]: MySQL Tools Community                           372 kB/s | 2.6 kB     00:00
Oct 27 15:18:40 vmfsppjb006 dnf[31652]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  3.9 kB/s | 2.4 kB     00:00
Oct 27 15:18:41 vmfsppjb006 dnf[31652]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 5.2 kB/s | 2.8 kB     00:00
Oct 27 15:18:41 vmfsppjb006 dnf[31652]: Microsoft Azure RPMs for RHEL8 Extended Update  6.1 kB/s | 2.1 kB     00:00
Oct 27 15:18:41 vmfsppjb006 dnf[31652]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 27 15:18:42 vmfsppjb006 dnf[31652]: Zabbix Official Repository non-supported - x86_  14 kB/s | 3.0 kB     00:00
Oct 27 15:18:42 vmfsppjb006 dnf[31652]: Metadata cache created.
Oct 27 15:18:43 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 15:19:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:19:37 vmfsppjb006 dbus-daemon[31721]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:19:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:19:38 vmfsppjb006 setroubleshoot[31721]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:19:38 vmfsppjb006 setroubleshoot[31721]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:19:38 vmfsppjb006 platform-python[31721]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Started Session 60 of user omsagent.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Reached target Timers.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Reached target Paths.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Starting D-Bus User Message Bus Socket.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Listening on D-Bus User Message Bus Socket.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Reached target Sockets.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Reached target Basic System.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Reached target Default.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Startup finished in 48ms.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Stopped target Default.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Stopped target Basic System.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Stopped target Sockets.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Stopped target Timers.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Closed D-Bus User Message Bus Socket.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Stopped target Paths.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Reached target Shutdown.
Oct 27 15:24:01 vmfsppjb006 systemd[32014]: Starting Exit the Session...
Oct 27 15:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 32057 (systemctl) with signal SIGKILL.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 15:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 15:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:24:37 vmfsppjb006 dbus-daemon[32095]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:24:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:24:38 vmfsppjb006 setroubleshoot[32095]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:24:38 vmfsppjb006 setroubleshoot[32095]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:24:38 vmfsppjb006 platform-python[32095]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:33:47 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 15:33:48 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 15:33:48 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 15:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 15:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 15:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 15:39:01 vmfsppjb006 systemd[1]: Started Session 62 of user omsagent.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Reached target Paths.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Starting D-Bus User Message Bus Socket.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Reached target Timers.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Listening on D-Bus User Message Bus Socket.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Reached target Sockets.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Reached target Basic System.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Reached target Default.
Oct 27 15:39:01 vmfsppjb006 systemd[33094]: Startup finished in 47ms.
Oct 27 15:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 15:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Stopped target Default.
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Stopped target Basic System.
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Stopped target Paths.
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Stopped target Sockets.
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Stopped target Timers.
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Closed D-Bus User Message Bus Socket.
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Reached target Shutdown.
Oct 27 15:39:02 vmfsppjb006 systemd[33094]: Starting Exit the Session...
Oct 27 15:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 33136 (systemctl) with signal SIGKILL.
Oct 27 15:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 15:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 15:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 15:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 15:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:39:37 vmfsppjb006 dbus-daemon[33174]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:39:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:39:38 vmfsppjb006 setroubleshoot[33174]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:39:39 vmfsppjb006 setroubleshoot[33174]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:39:39 vmfsppjb006 platform-python[33174]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:40:07 vmfsppjb006 python3.6[1683]: 2021-10-27T06:40:07.412833Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 13;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 15:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:45:37 vmfsppjb006 dbus-daemon[33559]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:45:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:45:38 vmfsppjb006 setroubleshoot[33559]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:45:39 vmfsppjb006 setroubleshoot[33559]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:45:39 vmfsppjb006 platform-python[33559]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Started Session 64 of user omsagent.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Reached target Paths.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Starting D-Bus User Message Bus Socket.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Reached target Timers.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Listening on D-Bus User Message Bus Socket.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Reached target Sockets.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Reached target Basic System.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Reached target Default.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Startup finished in 48ms.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Stopped target Default.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Stopped target Basic System.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Stopped target Sockets.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Closed D-Bus User Message Bus Socket.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Stopped target Timers.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Stopped target Paths.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Reached target Shutdown.
Oct 27 15:54:01 vmfsppjb006 systemd[34097]: Starting Exit the Session...
Oct 27 15:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 34139 (systemctl) with signal SIGKILL.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 15:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 15:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:54:37 vmfsppjb006 dbus-daemon[34178]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:54:38 vmfsppjb006 setroubleshoot[34178]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:54:39 vmfsppjb006 setroubleshoot[34178]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:54:39 vmfsppjb006 platform-python[34178]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 15:57:50 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 15:57:51 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 15:57:51 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 15:58:38 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 15:58:38 vmfsppjb006 dbus-daemon[34507]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 15:58:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 15:58:38 vmfsppjb006 setroubleshoot[34507]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 15:58:39 vmfsppjb006 setroubleshoot[34507]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 15:58:39 vmfsppjb006 platform-python[34507]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:02:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:02:37 vmfsppjb006 dbus-daemon[34784]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:02:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:02:37 vmfsppjb006 setroubleshoot[34784]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:02:38 vmfsppjb006 setroubleshoot[34784]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:02:38 vmfsppjb006 platform-python[34784]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:08:36 vmfsppjb006 python3.6[1683]: 2021-10-27T07:08:36.624389Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 16:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 16:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 16:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 16:09:01 vmfsppjb006 systemd[1]: Started Session 66 of user omsagent.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Reached target Paths.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Reached target Timers.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Starting D-Bus User Message Bus Socket.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Listening on D-Bus User Message Bus Socket.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Reached target Sockets.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Reached target Basic System.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Reached target Default.
Oct 27 16:09:01 vmfsppjb006 systemd[35197]: Startup finished in 46ms.
Oct 27 16:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 16:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Stopped target Default.
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Stopped target Basic System.
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Stopped target Timers.
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Stopped target Sockets.
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Closed D-Bus User Message Bus Socket.
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Stopped target Paths.
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Reached target Shutdown.
Oct 27 16:09:02 vmfsppjb006 systemd[35197]: Starting Exit the Session...
Oct 27 16:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 35239 (systemctl) with signal SIGKILL.
Oct 27 16:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 16:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 16:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 16:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 16:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:09:37 vmfsppjb006 dbus-daemon[35278]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:09:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:09:37 vmfsppjb006 setroubleshoot[35278]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:09:38 vmfsppjb006 setroubleshoot[35278]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:09:38 vmfsppjb006 platform-python[35278]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:10:12 vmfsppjb006 python3.6[1683]: 2021-10-27T07:10:12.959062Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 14;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 16:18:51 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 16:18:52 vmfsppjb006 dnf[35874]: Metadata cache refreshed recently.
Oct 27 16:18:52 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 16:19:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:19:37 vmfsppjb006 dbus-daemon[35925]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:19:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:19:38 vmfsppjb006 setroubleshoot[35925]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:19:38 vmfsppjb006 setroubleshoot[35925]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:19:38 vmfsppjb006 platform-python[35925]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Started Session 68 of user omsagent.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Reached target Paths.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Starting D-Bus User Message Bus Socket.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Reached target Timers.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Listening on D-Bus User Message Bus Socket.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Reached target Sockets.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Reached target Basic System.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Reached target Default.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Startup finished in 46ms.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Stopped target Default.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Stopped target Basic System.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Stopped target Timers.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Stopped target Paths.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Stopped target Sockets.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Closed D-Bus User Message Bus Socket.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Reached target Shutdown.
Oct 27 16:24:01 vmfsppjb006 systemd[36207]: Starting Exit the Session...
Oct 27 16:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 36249 (systemctl) with signal SIGKILL.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 16:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 16:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:24:37 vmfsppjb006 dbus-daemon[36297]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:24:38 vmfsppjb006 setroubleshoot[36297]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:24:38 vmfsppjb006 setroubleshoot[36297]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:24:38 vmfsppjb006 platform-python[36297]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:25:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:25:37 vmfsppjb006 dbus-daemon[36358]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:25:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:25:38 vmfsppjb006 setroubleshoot[36358]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:25:38 vmfsppjb006 setroubleshoot[36358]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:25:38 vmfsppjb006 platform-python[36358]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Started Session c3 of user root.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Reached target Paths.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Starting D-Bus User Message Bus Socket.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Reached target Timers.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Listening on D-Bus User Message Bus Socket.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Reached target Sockets.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Reached target Basic System.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Reached target Default.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Startup finished in 47ms.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Stopped target Default.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Stopped target Basic System.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Stopped target Paths.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Stopped target Timers.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Stopped target Sockets.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Closed D-Bus User Message Bus Socket.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Reached target Shutdown.
Oct 27 16:27:53 vmfsppjb006 systemd[36587]: Starting Exit the Session...
Oct 27 16:27:53 vmfsppjb006 systemd[1]: user@0.service: Killing process 36621 (systemctl) with signal SIGKILL.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 27 16:27:53 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 27 16:28:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:28:37 vmfsppjb006 dbus-daemon[36680]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:28:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:28:38 vmfsppjb006 setroubleshoot[36680]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:28:38 vmfsppjb006 setroubleshoot[36680]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:28:38 vmfsppjb006 platform-python[36680]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:29:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:29:37 vmfsppjb006 dbus-daemon[36744]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:29:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:29:38 vmfsppjb006 setroubleshoot[36744]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:29:38 vmfsppjb006 setroubleshoot[36744]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:29:38 vmfsppjb006 platform-python[36744]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 16:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 16:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 16:39:01 vmfsppjb006 systemd[1]: Started Session 71 of user omsagent.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Starting D-Bus User Message Bus Socket.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Reached target Paths.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Reached target Timers.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Listening on D-Bus User Message Bus Socket.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Reached target Sockets.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Reached target Basic System.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Reached target Default.
Oct 27 16:39:01 vmfsppjb006 systemd[37362]: Startup finished in 49ms.
Oct 27 16:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 16:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Stopped target Default.
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Stopped target Basic System.
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Stopped target Paths.
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Stopped target Timers.
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Stopped target Sockets.
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Closed D-Bus User Message Bus Socket.
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Reached target Shutdown.
Oct 27 16:39:02 vmfsppjb006 systemd[37362]: Starting Exit the Session...
Oct 27 16:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 37404 (systemctl) with signal SIGKILL.
Oct 27 16:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 16:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 16:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 16:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 16:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:39:37 vmfsppjb006 dbus-daemon[37442]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:39:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:39:38 vmfsppjb006 setroubleshoot[37442]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:39:39 vmfsppjb006 setroubleshoot[37442]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:39:39 vmfsppjb006 platform-python[37442]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:40:15 vmfsppjb006 python3.6[1683]: 2021-10-27T07:40:15.649348Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 15;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 16:41:20 vmfsppjb006 powershell[29992]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 29992 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 16:41:36 vmfsppjb006 powershell[37572]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:41:36 vmfsppjb006 powershell[37572]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 37572 in AppDomain: None.
Oct 27 16:41:36 vmfsppjb006 powershell[37572]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:45:54 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 16:45:55 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 16:45:55 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 16:46:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:46:37 vmfsppjb006 dbus-daemon[38002]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:46:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:46:38 vmfsppjb006 setroubleshoot[38002]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:46:39 vmfsppjb006 setroubleshoot[38002]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:46:39 vmfsppjb006 platform-python[38002]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:51:25 vmfsppjb006 powershell[38286]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:51:25 vmfsppjb006 powershell[38286]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 38286 in AppDomain: None.
Oct 27 16:51:25 vmfsppjb006 powershell[38286]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:51:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:51:37 vmfsppjb006 dbus-daemon[38319]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:51:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:51:38 vmfsppjb006 setroubleshoot[38319]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:51:39 vmfsppjb006 setroubleshoot[38319]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:51:39 vmfsppjb006 platform-python[38319]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:51:57 vmfsppjb006 powershell[38358]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:51:57 vmfsppjb006 powershell[38358]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 38358 in AppDomain: None.
Oct 27 16:51:57 vmfsppjb006 powershell[38358]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:52:24 vmfsppjb006 powershell[38286]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 38286 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 16:52:33 vmfsppjb006 powershell[38416]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:52:33 vmfsppjb006 powershell[38416]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 38416 in AppDomain: None.
Oct 27 16:52:33 vmfsppjb006 powershell[38416]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:52:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:52:37 vmfsppjb006 dbus-daemon[38448]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:52:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:52:38 vmfsppjb006 setroubleshoot[38448]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:52:39 vmfsppjb006 setroubleshoot[38448]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:52:39 vmfsppjb006 platform-python[38448]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:52:52 vmfsppjb006 powershell[38466]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:52:52 vmfsppjb006 powershell[38466]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 38466 in AppDomain: None.
Oct 27 16:52:52 vmfsppjb006 powershell[38466]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:52:52 vmfsppjb006 powershell[38466]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 38466 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 16:53:01 vmfsppjb006 powershell[38416]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 38416 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 16:53:25 vmfsppjb006 powershell[38524]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:53:25 vmfsppjb006 powershell[38524]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 38524 in AppDomain: None.
Oct 27 16:53:25 vmfsppjb006 powershell[38524]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:53:25 vmfsppjb006 powershell[38524]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 38524 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 16:53:33 vmfsppjb006 powershell[38547]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:53:33 vmfsppjb006 powershell[38547]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 38547 in AppDomain: None.
Oct 27 16:53:34 vmfsppjb006 powershell[38547]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:53:34 vmfsppjb006 powershell[38547]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 38547 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 16:53:39 vmfsppjb006 powershell[38566]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 16:53:39 vmfsppjb006 powershell[38566]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 38566 in AppDomain: None.
Oct 27 16:53:39 vmfsppjb006 powershell[38566]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 16:53:39 vmfsppjb006 powershell[38566]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 38566 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 16:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 16:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 16:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 16:54:01 vmfsppjb006 systemd[1]: Started Session 73 of user omsagent.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Reached target Paths.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Starting D-Bus User Message Bus Socket.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Reached target Timers.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Listening on D-Bus User Message Bus Socket.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Reached target Sockets.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Reached target Basic System.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Reached target Default.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Startup finished in 45ms.
Oct 27 16:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 16:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Stopped target Default.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Stopped target Basic System.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Stopped target Timers.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Stopped target Sockets.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Closed D-Bus User Message Bus Socket.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Stopped target Paths.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Reached target Shutdown.
Oct 27 16:54:01 vmfsppjb006 systemd[38618]: Starting Exit the Session...
Oct 27 16:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 38659 (systemctl) with signal SIGKILL.
Oct 27 16:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 16:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 16:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 16:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 16:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 16:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:54:37 vmfsppjb006 dbus-daemon[38695]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:54:38 vmfsppjb006 setroubleshoot[38695]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:54:39 vmfsppjb006 setroubleshoot[38695]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:54:39 vmfsppjb006 platform-python[38695]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 16:56:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 16:56:37 vmfsppjb006 dbus-daemon[38824]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 16:56:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 16:56:38 vmfsppjb006 setroubleshoot[38824]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 16:56:39 vmfsppjb006 setroubleshoot[38824]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 16:56:39 vmfsppjb006 platform-python[38824]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:01:56 vmfsppjb006 powershell[39132]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:01:56 vmfsppjb006 powershell[39132]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 39132 in AppDomain: None.
Oct 27 17:01:56 vmfsppjb006 powershell[39132]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 17:01:56 vmfsppjb006 powershell[39132]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 39132 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 17:02:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:02:37 vmfsppjb006 dbus-daemon[39190]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:02:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:02:38 vmfsppjb006 setroubleshoot[39190]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:02:39 vmfsppjb006 setroubleshoot[39190]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:02:39 vmfsppjb006 platform-python[39190]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:08:38 vmfsppjb006 python3.6[1683]: 2021-10-27T08:08:38.759848Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Started Session 75 of user omsagent.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Reached target Paths.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Reached target Timers.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Starting D-Bus User Message Bus Socket.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Listening on D-Bus User Message Bus Socket.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Reached target Sockets.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Reached target Basic System.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Reached target Default.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Startup finished in 46ms.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Stopped target Default.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Stopped target Basic System.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Stopped target Timers.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Stopped target Sockets.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Closed D-Bus User Message Bus Socket.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Stopped target Paths.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Reached target Shutdown.
Oct 27 17:09:01 vmfsppjb006 systemd[39565]: Starting Exit the Session...
Oct 27 17:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 39608 (systemctl) with signal SIGKILL.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 17:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 17:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:09:37 vmfsppjb006 dbus-daemon[39643]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:09:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:09:37 vmfsppjb006 setroubleshoot[39643]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:09:38 vmfsppjb006 setroubleshoot[39643]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:09:38 vmfsppjb006 platform-python[39643]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:09:57 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 17:09:58 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 17:09:58 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 17:10:21 vmfsppjb006 python3.6[1683]: 2021-10-27T08:10:21.068192Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 16;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 17:10:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:10:37 vmfsppjb006 dbus-daemon[39786]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:10:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:10:37 vmfsppjb006 setroubleshoot[39786]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:10:38 vmfsppjb006 setroubleshoot[39786]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:10:38 vmfsppjb006 platform-python[39786]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:11:27 vmfsppjb006 powershell[39849]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:11:27 vmfsppjb006 powershell[39849]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 39849 in AppDomain: None.
Oct 27 17:11:27 vmfsppjb006 powershell[39849]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 17:12:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:12:37 vmfsppjb006 dbus-daemon[39940]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:12:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:12:37 vmfsppjb006 setroubleshoot[39940]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:12:38 vmfsppjb006 setroubleshoot[39940]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:12:38 vmfsppjb006 platform-python[39940]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:18:55 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 17:18:56 vmfsppjb006 dnf[40347]: Metadata cache refreshed recently.
Oct 27 17:18:56 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 17:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 17:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 17:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 17:24:01 vmfsppjb006 systemd[1]: Started Session 77 of user omsagent.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Reached target Paths.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Reached target Timers.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Starting D-Bus User Message Bus Socket.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Listening on D-Bus User Message Bus Socket.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Reached target Sockets.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Reached target Basic System.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Reached target Default.
Oct 27 17:24:01 vmfsppjb006 systemd[40680]: Startup finished in 48ms.
Oct 27 17:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Stopped target Default.
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Stopped target Basic System.
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Stopped target Paths.
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Stopped target Sockets.
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Closed D-Bus User Message Bus Socket.
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Reached target Shutdown.
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Starting Exit the Session...
Oct 27 17:24:02 vmfsppjb006 systemd[40680]: Stopped target Timers.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 40723 (systemctl) with signal SIGKILL.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 17:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 17:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 17:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:24:37 vmfsppjb006 dbus-daemon[40761]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:24:38 vmfsppjb006 setroubleshoot[40761]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:24:38 vmfsppjb006 setroubleshoot[40761]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:24:38 vmfsppjb006 platform-python[40761]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:25:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:25:37 vmfsppjb006 dbus-daemon[40836]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:25:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:25:38 vmfsppjb006 setroubleshoot[40836]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:25:38 vmfsppjb006 setroubleshoot[40836]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:25:38 vmfsppjb006 platform-python[40836]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:30:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:30:37 vmfsppjb006 dbus-daemon[41169]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:30:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:30:38 vmfsppjb006 setroubleshoot[41169]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:30:38 vmfsppjb006 setroubleshoot[41169]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:30:38 vmfsppjb006 platform-python[41169]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:34:00 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 17:34:01 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 17:34:01 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 17:38:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:38:37 vmfsppjb006 dbus-daemon[41758]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:38:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:38:38 vmfsppjb006 setroubleshoot[41758]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:38:38 vmfsppjb006 setroubleshoot[41758]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:38:38 vmfsppjb006 platform-python[41758]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 17:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 17:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 17:39:01 vmfsppjb006 systemd[1]: Started Session 79 of user omsagent.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Reached target Paths.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Starting D-Bus User Message Bus Socket.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Reached target Timers.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Listening on D-Bus User Message Bus Socket.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Reached target Sockets.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Reached target Basic System.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Reached target Default.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Startup finished in 47ms.
Oct 27 17:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 17:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Stopped target Default.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Stopped target Basic System.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Stopped target Paths.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Stopped target Timers.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Stopped target Sockets.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Closed D-Bus User Message Bus Socket.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Reached target Shutdown.
Oct 27 17:39:01 vmfsppjb006 systemd[41792]: Starting Exit the Session...
Oct 27 17:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 41837 (systemctl) with signal SIGKILL.
Oct 27 17:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 17:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 17:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 17:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 17:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:39:37 vmfsppjb006 dbus-daemon[41878]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:39:38 vmfsppjb006 setroubleshoot[41878]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:39:38 vmfsppjb006 setroubleshoot[41878]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:39:38 vmfsppjb006 platform-python[41878]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:40:25 vmfsppjb006 python3.6[1683]: 2021-10-27T08:40:25.044250Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 17;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 17:40:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:40:37 vmfsppjb006 dbus-daemon[41956]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:40:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:40:38 vmfsppjb006 setroubleshoot[41956]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:40:38 vmfsppjb006 setroubleshoot[41956]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:40:38 vmfsppjb006 platform-python[41956]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:50:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:50:37 vmfsppjb006 dbus-daemon[42589]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:50:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:50:38 vmfsppjb006 setroubleshoot[42589]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:50:39 vmfsppjb006 setroubleshoot[42589]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:50:39 vmfsppjb006 platform-python[42589]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:52:07 vmfsppjb006 powershell[39849]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 39849 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 17:52:23 vmfsppjb006 powershell[42709]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:53:08 vmfsppjb006 powershell[42763]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:53:47 vmfsppjb006 powershell[42812]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:53:47 vmfsppjb006 powershell[42812]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 42812 in AppDomain: None.
Oct 27 17:53:47 vmfsppjb006 powershell[42812]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Started Session 81 of user omsagent.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Starting D-Bus User Message Bus Socket.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Reached target Timers.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Reached target Paths.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Listening on D-Bus User Message Bus Socket.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Reached target Sockets.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Reached target Basic System.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Reached target Default.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Startup finished in 45ms.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Stopped target Default.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Stopped target Basic System.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Stopped target Sockets.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Stopped target Timers.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Stopped target Paths.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Closed D-Bus User Message Bus Socket.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Reached target Shutdown.
Oct 27 17:54:01 vmfsppjb006 systemd[42848]: Starting Exit the Session...
Oct 27 17:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 42889 (systemctl) with signal SIGKILL.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 17:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 17:54:09 vmfsppjb006 powershell[42924]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:54:27 vmfsppjb006 powershell[42952]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:54:27 vmfsppjb006 powershell[42952]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 42952 in AppDomain: None.
Oct 27 17:54:27 vmfsppjb006 powershell[42952]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 17:54:27 vmfsppjb006 powershell[42952]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 42952 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 17:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 17:54:37 vmfsppjb006 dbus-daemon[42981]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 17:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 17:54:38 vmfsppjb006 setroubleshoot[42981]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 17:54:39 vmfsppjb006 setroubleshoot[42981]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 17:54:39 vmfsppjb006 platform-python[42981]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 17:54:42 vmfsppjb006 powershell[42991]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:54:42 vmfsppjb006 powershell[42991]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 42991 in AppDomain: None.
Oct 27 17:54:42 vmfsppjb006 powershell[42991]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 17:54:43 vmfsppjb006 powershell[42991]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 42991 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 17:57:24 vmfsppjb006 powershell[43158]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:57:24 vmfsppjb006 powershell[43158]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 43158 in AppDomain: None.
Oct 27 17:57:24 vmfsppjb006 powershell[43158]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 17:57:25 vmfsppjb006 powershell[43158]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 43158 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 17:57:33 vmfsppjb006 powershell[43186]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 17:57:34 vmfsppjb006 powershell[43186]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 43186 in AppDomain: None.
Oct 27 17:57:34 vmfsppjb006 powershell[43186]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 17:57:34 vmfsppjb006 powershell[43186]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 43186 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 17:58:03 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 17:58:04 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 17:58:04 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 18:01:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 18:01:37 vmfsppjb006 dbus-daemon[43525]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 18:01:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 18:01:38 vmfsppjb006 setroubleshoot[43525]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 18:01:39 vmfsppjb006 setroubleshoot[43525]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 18:01:39 vmfsppjb006 platform-python[43525]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 18:08:43 vmfsppjb006 python3.6[1683]: 2021-10-27T09:08:43.232700Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 18:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 18:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 18:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 18:09:01 vmfsppjb006 systemd[1]: Started Session 83 of user omsagent.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Reached target Paths.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Starting D-Bus User Message Bus Socket.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Reached target Timers.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Listening on D-Bus User Message Bus Socket.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Reached target Sockets.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Reached target Basic System.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Reached target Default.
Oct 27 18:09:01 vmfsppjb006 systemd[43944]: Startup finished in 45ms.
Oct 27 18:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 18:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Stopped target Default.
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Stopped target Basic System.
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Stopped target Timers.
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Stopped target Paths.
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Stopped target Sockets.
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Closed D-Bus User Message Bus Socket.
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Reached target Shutdown.
Oct 27 18:09:02 vmfsppjb006 systemd[43944]: Starting Exit the Session...
Oct 27 18:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 43990 (systemctl) with signal SIGKILL.
Oct 27 18:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 18:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 18:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 18:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 18:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 18:09:37 vmfsppjb006 dbus-daemon[44029]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 18:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 18:09:38 vmfsppjb006 setroubleshoot[44029]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 18:09:39 vmfsppjb006 setroubleshoot[44029]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 18:09:39 vmfsppjb006 platform-python[44029]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 18:10:25 vmfsppjb006 python3.6[1683]: 2021-10-27T09:10:25.593653Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 18;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 18:18:59 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 18:19:00 vmfsppjb006 dnf[44569]: packages-microsoft-com-prod                      12 kB/s | 3.0 kB     00:00
Oct 27 18:19:00 vmfsppjb006 dnf[44569]: MySQL 8.0 Community Server                       20 kB/s | 2.6 kB     00:00
Oct 27 18:19:00 vmfsppjb006 dnf[44569]: MySQL Connectors Community                      373 kB/s | 2.6 kB     00:00
Oct 27 18:19:00 vmfsppjb006 dnf[44569]: MySQL Tools Community                           206 kB/s | 2.6 kB     00:00
Oct 27 18:19:01 vmfsppjb006 dnf[44569]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.2 kB/s | 2.4 kB     00:00
Oct 27 18:19:01 vmfsppjb006 dnf[44569]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 3.9 kB/s | 2.8 kB     00:00
Oct 27 18:19:02 vmfsppjb006 dnf[44569]: Microsoft Azure RPMs for RHEL8 Extended Update  5.9 kB/s | 2.1 kB     00:00
Oct 27 18:19:02 vmfsppjb006 dnf[44569]: Zabbix Official Repository - x86_64              14 kB/s | 2.9 kB     00:00
Oct 27 18:19:02 vmfsppjb006 dnf[44569]: Zabbix Official Repository non-supported - x86_  12 kB/s | 3.0 kB     00:00
Oct 27 18:19:03 vmfsppjb006 dnf[44569]: Metadata cache created.
Oct 27 18:19:03 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 18:22:06 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 18:22:07 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 18:22:07 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Started Session 85 of user omsagent.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Starting D-Bus User Message Bus Socket.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Reached target Timers.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Reached target Paths.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Listening on D-Bus User Message Bus Socket.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Reached target Sockets.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Reached target Basic System.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Reached target Default.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Startup finished in 45ms.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Stopped target Default.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Stopped target Basic System.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Stopped target Timers.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Stopped target Paths.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Stopped target Sockets.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Closed D-Bus User Message Bus Socket.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Reached target Shutdown.
Oct 27 18:24:01 vmfsppjb006 systemd[44946]: Starting Exit the Session...
Oct 27 18:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 44989 (systemctl) with signal SIGKILL.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 18:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 18:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 18:24:37 vmfsppjb006 dbus-daemon[45028]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 18:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 18:24:37 vmfsppjb006 setroubleshoot[45028]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 18:24:38 vmfsppjb006 setroubleshoot[45028]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 18:24:38 vmfsppjb006 platform-python[45028]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 18:28:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 18:28:37 vmfsppjb006 dbus-daemon[45257]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 18:28:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 18:28:38 vmfsppjb006 setroubleshoot[45257]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 18:28:38 vmfsppjb006 setroubleshoot[45257]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 18:28:38 vmfsppjb006 platform-python[45257]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 18:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 18:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 18:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 18:39:01 vmfsppjb006 systemd[1]: Started Session 87 of user omsagent.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Reached target Paths.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Reached target Timers.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Starting D-Bus User Message Bus Socket.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Listening on D-Bus User Message Bus Socket.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Reached target Sockets.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Reached target Basic System.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Reached target Default.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Startup finished in 45ms.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Stopped target Default.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Stopped target Basic System.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Stopped target Timers.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Stopped target Sockets.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Closed D-Bus User Message Bus Socket.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Stopped target Paths.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Reached target Shutdown.
Oct 27 18:39:02 vmfsppjb006 systemd[45848]: Starting Exit the Session...
Oct 27 18:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 45890 (systemctl) with signal SIGKILL.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 18:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 18:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 18:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 18:39:37 vmfsppjb006 dbus-daemon[45930]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 18:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 18:39:38 vmfsppjb006 setroubleshoot[45930]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 18:39:38 vmfsppjb006 setroubleshoot[45930]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 18:39:38 vmfsppjb006 platform-python[45930]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 18:40:27 vmfsppjb006 python3.6[1683]: 2021-10-27T09:40:27.036638Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 19;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 18:51:16 vmfsppjb006 powershell[46605]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 18:51:16 vmfsppjb006 powershell[46605]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 46605 in AppDomain: None.
Oct 27 18:51:16 vmfsppjb006 powershell[46605]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 18:51:16 vmfsppjb006 powershell[46605]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 46605 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Started Session c4 of user root.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Starting D-Bus User Message Bus Socket.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Reached target Paths.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Reached target Timers.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Listening on D-Bus User Message Bus Socket.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Reached target Sockets.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Reached target Basic System.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Reached target Default.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Startup finished in 45ms.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Stopped target Default.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Stopped target Basic System.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Stopped target Timers.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Stopped target Paths.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Stopped target Sockets.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Closed D-Bus User Message Bus Socket.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Reached target Shutdown.
Oct 27 18:52:09 vmfsppjb006 systemd[46738]: Starting Exit the Session...
Oct 27 18:52:09 vmfsppjb006 systemd[1]: user@0.service: Killing process 46776 (systemctl) with signal SIGKILL.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 27 18:52:09 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 27 18:52:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 18:52:37 vmfsppjb006 dbus-daemon[46818]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 18:52:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 18:52:38 vmfsppjb006 setroubleshoot[46818]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 18:52:38 vmfsppjb006 setroubleshoot[46818]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 18:52:39 vmfsppjb006 platform-python[46818]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 18:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 18:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 18:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 18:54:01 vmfsppjb006 systemd[1]: Started Session 90 of user omsagent.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Reached target Paths.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Starting D-Bus User Message Bus Socket.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Reached target Timers.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Listening on D-Bus User Message Bus Socket.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Reached target Sockets.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Reached target Basic System.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Reached target Default.
Oct 27 18:54:01 vmfsppjb006 systemd[46905]: Startup finished in 43ms.
Oct 27 18:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 18:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Stopped target Default.
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Stopped target Basic System.
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Stopped target Timers.
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Stopped target Sockets.
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Closed D-Bus User Message Bus Socket.
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Stopped target Paths.
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Reached target Shutdown.
Oct 27 18:54:02 vmfsppjb006 systemd[46905]: Starting Exit the Session...
Oct 27 18:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 46946 (systemctl) with signal SIGKILL.
Oct 27 18:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 18:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 18:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 18:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 18:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 18:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 18:54:37 vmfsppjb006 dbus-daemon[46984]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 18:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 18:54:38 vmfsppjb006 setroubleshoot[46984]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 18:54:39 vmfsppjb006 setroubleshoot[46984]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 18:54:39 vmfsppjb006 platform-python[46984]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:00:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:00:37 vmfsppjb006 dbus-daemon[47333]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:00:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:00:38 vmfsppjb006 setroubleshoot[47333]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:00:39 vmfsppjb006 setroubleshoot[47333]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:00:39 vmfsppjb006 platform-python[47333]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:04:55 vmfsppjb006 powershell[47600]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:04:55 vmfsppjb006 powershell[47600]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47600 in AppDomain: None.
Oct 27 19:04:55 vmfsppjb006 powershell[47600]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:04:55 vmfsppjb006 powershell[47600]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 47600 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:05:01 vmfsppjb006 powershell[47621]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:05:01 vmfsppjb006 powershell[47621]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47621 in AppDomain: None.
Oct 27 19:05:01 vmfsppjb006 powershell[47621]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:05:01 vmfsppjb006 powershell[47621]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 47621 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:05:06 vmfsppjb006 powershell[47646]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:05:06 vmfsppjb006 powershell[47646]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47646 in AppDomain: None.
Oct 27 19:05:07 vmfsppjb006 powershell[47646]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:05:07 vmfsppjb006 powershell[47646]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 47646 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:05:13 vmfsppjb006 powershell[47672]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:05:13 vmfsppjb006 powershell[47672]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47672 in AppDomain: None.
Oct 27 19:05:14 vmfsppjb006 powershell[47672]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:05:14 vmfsppjb006 powershell[47672]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 47672 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:05:34 vmfsppjb006 powershell[47705]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:05:34 vmfsppjb006 powershell[47705]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47705 in AppDomain: None.
Oct 27 19:05:34 vmfsppjb006 powershell[47705]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:05:34 vmfsppjb006 powershell[47705]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 47705 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:05:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:05:37 vmfsppjb006 dbus-daemon[47723]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:05:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:05:38 vmfsppjb006 setroubleshoot[47723]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:05:39 vmfsppjb006 setroubleshoot[47723]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:05:39 vmfsppjb006 platform-python[47723]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:05:59 vmfsppjb006 powershell[47756]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:05:59 vmfsppjb006 powershell[47756]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47756 in AppDomain: None.
Oct 27 19:06:00 vmfsppjb006 powershell[47756]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:06:00 vmfsppjb006 powershell[47756]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 47756 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:06:07 vmfsppjb006 powershell[47775]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:06:07 vmfsppjb006 powershell[47775]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47775 in AppDomain: None.
Oct 27 19:06:07 vmfsppjb006 powershell[47775]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:06:13 vmfsppjb006 powershell[47806]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:06:13 vmfsppjb006 powershell[47806]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 47806 in AppDomain: None.
Oct 27 19:06:13 vmfsppjb006 powershell[47806]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:06:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:06:37 vmfsppjb006 dbus-daemon[47843]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:06:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:06:38 vmfsppjb006 setroubleshoot[47843]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:06:39 vmfsppjb006 setroubleshoot[47843]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:06:39 vmfsppjb006 platform-python[47843]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:08:45 vmfsppjb006 python3.6[1683]: 2021-10-27T10:08:45.565214Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Started Session 92 of user omsagent.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Reached target Timers.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Starting D-Bus User Message Bus Socket.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Reached target Paths.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Listening on D-Bus User Message Bus Socket.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Reached target Sockets.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Reached target Basic System.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Reached target Default.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Startup finished in 45ms.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Stopped target Default.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Stopped target Basic System.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Stopped target Sockets.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Closed D-Bus User Message Bus Socket.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Stopped target Paths.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Reached target Shutdown.
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Starting Exit the Session...
Oct 27 19:09:01 vmfsppjb006 systemd[47985]: Stopped target Timers.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 48026 (systemctl) with signal SIGKILL.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 19:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 19:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:09:37 vmfsppjb006 dbus-daemon[48065]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:09:38 vmfsppjb006 setroubleshoot[48065]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:09:39 vmfsppjb006 setroubleshoot[48065]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:09:39 vmfsppjb006 platform-python[48065]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:10:10 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 19:10:11 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 19:10:11 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 19:10:27 vmfsppjb006 python3.6[1683]: 2021-10-27T10:10:27.911130Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 20;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 19:10:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:10:37 vmfsppjb006 dbus-daemon[48208]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:10:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:10:38 vmfsppjb006 setroubleshoot[48208]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:10:39 vmfsppjb006 setroubleshoot[48208]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:10:39 vmfsppjb006 platform-python[48208]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:19:05 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 19:19:05 vmfsppjb006 dnf[48693]: Metadata cache refreshed recently.
Oct 27 19:19:05 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 19:19:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:19:37 vmfsppjb006 dbus-daemon[48728]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:19:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:19:38 vmfsppjb006 setroubleshoot[48728]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:19:39 vmfsppjb006 setroubleshoot[48728]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:19:39 vmfsppjb006 platform-python[48728]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 19:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 19:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 19:24:01 vmfsppjb006 systemd[1]: Started Session 94 of user omsagent.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Reached target Timers.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Starting D-Bus User Message Bus Socket.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Reached target Paths.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Listening on D-Bus User Message Bus Socket.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Reached target Sockets.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Reached target Basic System.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Reached target Default.
Oct 27 19:24:01 vmfsppjb006 systemd[48978]: Startup finished in 48ms.
Oct 27 19:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 19:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Stopped target Default.
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Stopped target Basic System.
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Stopped target Paths.
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Stopped target Timers.
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Stopped target Sockets.
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Closed D-Bus User Message Bus Socket.
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Reached target Shutdown.
Oct 27 19:24:02 vmfsppjb006 systemd[48978]: Starting Exit the Session...
Oct 27 19:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 49020 (systemctl) with signal SIGKILL.
Oct 27 19:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 19:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 19:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 19:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 19:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:24:37 vmfsppjb006 dbus-daemon[49066]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:24:37 vmfsppjb006 setroubleshoot[49066]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:24:38 vmfsppjb006 setroubleshoot[49066]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:24:38 vmfsppjb006 platform-python[49066]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:26:43 vmfsppjb006 powershell[49191]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:26:43 vmfsppjb006 powershell[49191]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 49191 in AppDomain: None.
Oct 27 19:26:43 vmfsppjb006 powershell[49191]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:26:43 vmfsppjb006 powershell[49191]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 49191 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:26:54 vmfsppjb006 powershell[49223]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:26:54 vmfsppjb006 powershell[49223]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 49223 in AppDomain: None.
Oct 27 19:26:55 vmfsppjb006 powershell[49223]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:26:55 vmfsppjb006 powershell[49223]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 49223 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:27:22 vmfsppjb006 powershell[49269]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:27:22 vmfsppjb006 powershell[49269]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 49269 in AppDomain: None.
Oct 27 19:27:22 vmfsppjb006 powershell[49269]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:27:22 vmfsppjb006 powershell[49269]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 49269 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:27:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:27:37 vmfsppjb006 dbus-daemon[49298]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:27:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:27:37 vmfsppjb006 setroubleshoot[49298]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:27:38 vmfsppjb006 setroubleshoot[49298]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:27:38 vmfsppjb006 platform-python[49298]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:30:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:30:37 vmfsppjb006 dbus-daemon[49484]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:30:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:30:37 vmfsppjb006 setroubleshoot[49484]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:30:38 vmfsppjb006 setroubleshoot[49484]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:30:38 vmfsppjb006 platform-python[49484]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:33:58 vmfsppjb006 powershell[49684]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:33:58 vmfsppjb006 powershell[49684]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 49684 in AppDomain: None.
Oct 27 19:33:58 vmfsppjb006 powershell[49684]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:34:13 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 19:34:14 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 19:34:14 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 19:34:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:34:37 vmfsppjb006 dbus-daemon[49829]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:34:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:34:38 vmfsppjb006 setroubleshoot[49829]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:34:38 vmfsppjb006 setroubleshoot[49829]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:34:38 vmfsppjb006 platform-python[49829]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:38:07 vmfsppjb006 powershell[49684]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 49684 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:38:12 vmfsppjb006 powershell[50077]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:38:12 vmfsppjb006 powershell[50077]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 50077 in AppDomain: None.
Oct 27 19:38:12 vmfsppjb006 powershell[50077]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:38:12 vmfsppjb006 powershell[50077]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 50077 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:38:23 vmfsppjb006 powershell[50111]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:38:23 vmfsppjb006 powershell[50111]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 50111 in AppDomain: None.
Oct 27 19:38:23 vmfsppjb006 powershell[50111]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:38:23 vmfsppjb006 powershell[50111]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 50111 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:38:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:38:37 vmfsppjb006 dbus-daemon[50142]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:38:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:38:38 vmfsppjb006 setroubleshoot[50142]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:38:38 vmfsppjb006 setroubleshoot[50142]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:38:38 vmfsppjb006 platform-python[50142]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Started Session 96 of user omsagent.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Reached target Paths.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Reached target Timers.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Starting D-Bus User Message Bus Socket.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Listening on D-Bus User Message Bus Socket.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Reached target Sockets.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Reached target Basic System.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Reached target Default.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Startup finished in 45ms.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Stopped target Default.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Stopped target Basic System.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Stopped target Paths.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Stopped target Sockets.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Closed D-Bus User Message Bus Socket.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Reached target Shutdown.
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Starting Exit the Session...
Oct 27 19:39:01 vmfsppjb006 systemd[50173]: Stopped target Timers.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 50214 (systemctl) with signal SIGKILL.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 19:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 19:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:39:37 vmfsppjb006 dbus-daemon[50265]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:39:38 vmfsppjb006 setroubleshoot[50265]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:39:38 vmfsppjb006 setroubleshoot[50265]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:39:38 vmfsppjb006 platform-python[50265]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:40:28 vmfsppjb006 python3.6[1683]: 2021-10-27T10:40:28.560962Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 21;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 19:45:09 vmfsppjb006 powershell[50579]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:45:09 vmfsppjb006 powershell[50579]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 50579 in AppDomain: None.
Oct 27 19:45:10 vmfsppjb006 powershell[50579]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:45:10 vmfsppjb006 powershell[50579]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 50579 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:45:29 vmfsppjb006 powershell[50626]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:45:29 vmfsppjb006 powershell[50626]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 50626 in AppDomain: None.
Oct 27 19:45:29 vmfsppjb006 powershell[50626]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:45:29 vmfsppjb006 powershell[50626]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 50626 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:45:33 vmfsppjb006 powershell[50644]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:45:33 vmfsppjb006 powershell[50644]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 50644 in AppDomain: None.
Oct 27 19:45:33 vmfsppjb006 powershell[50644]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:45:34 vmfsppjb006 powershell[50644]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 50644 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 19:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:45:37 vmfsppjb006 dbus-daemon[50662]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:45:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:45:38 vmfsppjb006 setroubleshoot[50662]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:45:38 vmfsppjb006 setroubleshoot[50662]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:45:38 vmfsppjb006 platform-python[50662]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:46:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:46:37 vmfsppjb006 dbus-daemon[50735]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:46:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:46:38 vmfsppjb006 setroubleshoot[50735]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:46:38 vmfsppjb006 setroubleshoot[50735]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:46:38 vmfsppjb006 platform-python[50735]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:51:14 vmfsppjb006 powershell[50989]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 19:51:14 vmfsppjb006 powershell[50989]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 50989 in AppDomain: None.
Oct 27 19:51:14 vmfsppjb006 powershell[50989]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 19:51:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:51:37 vmfsppjb006 dbus-daemon[51050]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:51:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:51:38 vmfsppjb006 setroubleshoot[51050]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:51:38 vmfsppjb006 setroubleshoot[51050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:51:38 vmfsppjb006 platform-python[51050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 19:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 19:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 19:54:01 vmfsppjb006 systemd[1]: Started Session 98 of user omsagent.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Reached target Timers.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Starting D-Bus User Message Bus Socket.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Reached target Paths.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Listening on D-Bus User Message Bus Socket.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Reached target Sockets.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Reached target Basic System.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Reached target Default.
Oct 27 19:54:01 vmfsppjb006 systemd[51213]: Startup finished in 46ms.
Oct 27 19:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 19:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Stopped target Default.
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Stopped target Basic System.
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Stopped target Paths.
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Stopped target Sockets.
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Closed D-Bus User Message Bus Socket.
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Stopped target Timers.
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Reached target Shutdown.
Oct 27 19:54:02 vmfsppjb006 systemd[51213]: Starting Exit the Session...
Oct 27 19:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 51254 (systemctl) with signal SIGKILL.
Oct 27 19:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 19:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 19:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 19:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 19:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 19:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:54:37 vmfsppjb006 dbus-daemon[51304]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:54:38 vmfsppjb006 setroubleshoot[51304]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:54:38 vmfsppjb006 setroubleshoot[51304]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:54:39 vmfsppjb006 platform-python[51304]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 19:58:16 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 19:58:17 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 19:58:17 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 19:58:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 19:58:37 vmfsppjb006 dbus-daemon[51636]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 19:58:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 19:58:38 vmfsppjb006 setroubleshoot[51636]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 19:58:39 vmfsppjb006 setroubleshoot[51636]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 19:58:39 vmfsppjb006 platform-python[51636]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:05:08 vmfsppjb006 powershell[52065]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:05:08 vmfsppjb006 powershell[52065]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52065 in AppDomain: None.
Oct 27 20:05:08 vmfsppjb006 powershell[52065]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:05:08 vmfsppjb006 powershell[52065]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52065 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:05:20 vmfsppjb006 powershell[52097]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:05:20 vmfsppjb006 powershell[52097]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52097 in AppDomain: None.
Oct 27 20:05:20 vmfsppjb006 powershell[52097]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:05:20 vmfsppjb006 powershell[52097]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52097 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:05:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:05:37 vmfsppjb006 dbus-daemon[52128]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:05:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:05:38 vmfsppjb006 setroubleshoot[52128]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:05:39 vmfsppjb006 setroubleshoot[52128]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:05:39 vmfsppjb006 platform-python[52128]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:05:51 vmfsppjb006 powershell[52149]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:05:51 vmfsppjb006 powershell[52149]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52149 in AppDomain: None.
Oct 27 20:05:51 vmfsppjb006 powershell[52149]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:05:51 vmfsppjb006 powershell[52149]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52149 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:06:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:06:37 vmfsppjb006 dbus-daemon[52214]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:06:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:06:38 vmfsppjb006 setroubleshoot[52214]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:06:39 vmfsppjb006 setroubleshoot[52214]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:06:39 vmfsppjb006 platform-python[52214]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:07:35 vmfsppjb006 powershell[52269]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:07:35 vmfsppjb006 powershell[52269]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52269 in AppDomain: None.
Oct 27 20:07:35 vmfsppjb006 powershell[52269]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:07:36 vmfsppjb006 powershell[52269]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52269 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:08:12 vmfsppjb006 powershell[52323]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:08:13 vmfsppjb006 powershell[52323]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52323 in AppDomain: None.
Oct 27 20:08:13 vmfsppjb006 powershell[52323]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:08:13 vmfsppjb006 powershell[52323]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52323 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:08:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:08:37 vmfsppjb006 dbus-daemon[52362]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:08:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:08:38 vmfsppjb006 setroubleshoot[52362]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:08:39 vmfsppjb006 setroubleshoot[52362]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:08:39 vmfsppjb006 platform-python[52362]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:08:46 vmfsppjb006 python3.6[1683]: 2021-10-27T11:08:46.114826Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Started Session 100 of user omsagent.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Reached target Paths.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Reached target Timers.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Starting D-Bus User Message Bus Socket.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Listening on D-Bus User Message Bus Socket.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Reached target Sockets.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Reached target Basic System.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Reached target Default.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Startup finished in 45ms.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Stopped target Default.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Stopped target Basic System.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Stopped target Sockets.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Stopped target Timers.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Stopped target Paths.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Closed D-Bus User Message Bus Socket.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Reached target Shutdown.
Oct 27 20:09:01 vmfsppjb006 systemd[52403]: Starting Exit the Session...
Oct 27 20:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 52444 (systemctl) with signal SIGKILL.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 20:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 20:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:09:37 vmfsppjb006 dbus-daemon[52483]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:09:38 vmfsppjb006 setroubleshoot[52483]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:09:39 vmfsppjb006 setroubleshoot[52483]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:09:39 vmfsppjb006 platform-python[52483]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:10:34 vmfsppjb006 python3.6[1683]: 2021-10-27T11:10:34.467817Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 22;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 20:10:36 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:10:36 vmfsppjb006 dbus-daemon[52557]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:10:36 vmfsppjb006 powershell[52556]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:10:36 vmfsppjb006 powershell[52556]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52556 in AppDomain: None.
Oct 27 20:10:37 vmfsppjb006 powershell[52556]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:10:37 vmfsppjb006 powershell[52556]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52556 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:10:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:10:37 vmfsppjb006 setroubleshoot[52557]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:10:38 vmfsppjb006 setroubleshoot[52557]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:10:38 vmfsppjb006 platform-python[52557]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:10:41 vmfsppjb006 powershell[52582]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:10:41 vmfsppjb006 powershell[52582]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52582 in AppDomain: None.
Oct 27 20:10:41 vmfsppjb006 powershell[52582]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:10:42 vmfsppjb006 powershell[52582]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52582 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:11:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:11:37 vmfsppjb006 dbus-daemon[52650]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:11:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:11:38 vmfsppjb006 setroubleshoot[52650]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:11:39 vmfsppjb006 setroubleshoot[52650]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:11:39 vmfsppjb006 platform-python[52650]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:12:00 vmfsppjb006 powershell[52684]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:12:00 vmfsppjb006 powershell[52684]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52684 in AppDomain: None.
Oct 27 20:12:01 vmfsppjb006 powershell[52684]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:12:01 vmfsppjb006 powershell[52684]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52684 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:12:09 vmfsppjb006 powershell[52703]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:12:09 vmfsppjb006 powershell[52703]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52703 in AppDomain: None.
Oct 27 20:12:09 vmfsppjb006 powershell[52703]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:12:10 vmfsppjb006 powershell[52703]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52703 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:12:15 vmfsppjb006 powershell[52732]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:12:15 vmfsppjb006 powershell[52732]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 52732 in AppDomain: None.
Oct 27 20:12:15 vmfsppjb006 powershell[52732]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:12:16 vmfsppjb006 powershell[52732]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 52732 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:12:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:12:37 vmfsppjb006 dbus-daemon[52767]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:12:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:12:38 vmfsppjb006 setroubleshoot[52767]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:12:39 vmfsppjb006 setroubleshoot[52767]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:12:39 vmfsppjb006 platform-python[52767]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:19:06 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 20:19:07 vmfsppjb006 dnf[53142]: Metadata cache refreshed recently.
Oct 27 20:19:07 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 20:19:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:19:37 vmfsppjb006 dbus-daemon[53177]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:19:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:19:38 vmfsppjb006 setroubleshoot[53177]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:19:39 vmfsppjb006 setroubleshoot[53177]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:19:39 vmfsppjb006 platform-python[53177]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:20:11 vmfsppjb006 powershell[53216]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:20:11 vmfsppjb006 powershell[53216]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 53216 in AppDomain: None.
Oct 27 20:20:11 vmfsppjb006 powershell[53216]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:20:11 vmfsppjb006 powershell[53216]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 53216 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:20:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:20:38 vmfsppjb006 dbus-daemon[53262]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:20:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:20:38 vmfsppjb006 setroubleshoot[53262]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:20:39 vmfsppjb006 setroubleshoot[53262]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:20:39 vmfsppjb006 platform-python[53262]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:22:19 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 20:22:20 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 20:22:20 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Started Session 102 of user omsagent.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Starting D-Bus User Message Bus Socket.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Reached target Paths.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Reached target Timers.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Listening on D-Bus User Message Bus Socket.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Reached target Sockets.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Reached target Basic System.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Reached target Default.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Startup finished in 45ms.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Stopped target Default.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Stopped target Basic System.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Stopped target Sockets.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Closed D-Bus User Message Bus Socket.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Stopped target Paths.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Reached target Shutdown.
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Starting Exit the Session...
Oct 27 20:24:01 vmfsppjb006 systemd[53543]: Stopped target Timers.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 53584 (systemctl) with signal SIGKILL.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 20:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 20:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:24:37 vmfsppjb006 dbus-daemon[53624]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:24:37 vmfsppjb006 setroubleshoot[53624]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:24:38 vmfsppjb006 setroubleshoot[53624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:24:38 vmfsppjb006 platform-python[53624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:29:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:29:37 vmfsppjb006 dbus-daemon[53912]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:29:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:29:37 vmfsppjb006 setroubleshoot[53912]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:29:38 vmfsppjb006 setroubleshoot[53912]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:29:38 vmfsppjb006 platform-python[53912]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:32:40 vmfsppjb006 powershell[54088]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:32:41 vmfsppjb006 powershell[54088]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 54088 in AppDomain: None.
Oct 27 20:32:41 vmfsppjb006 powershell[54088]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:34:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:34:37 vmfsppjb006 dbus-daemon[54251]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:34:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:34:38 vmfsppjb006 setroubleshoot[54251]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:34:38 vmfsppjb006 setroubleshoot[54251]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:34:38 vmfsppjb006 platform-python[54251]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:36:58 vmfsppjb006 powershell[54088]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 54088 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:37:08 vmfsppjb006 powershell[54416]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:37:08 vmfsppjb006 powershell[54416]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 54416 in AppDomain: None.
Oct 27 20:37:08 vmfsppjb006 powershell[54416]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:37:09 vmfsppjb006 powershell[54416]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 54416 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:37:12 vmfsppjb006 powershell[54434]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:37:12 vmfsppjb006 powershell[54434]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 54434 in AppDomain: None.
Oct 27 20:37:12 vmfsppjb006 powershell[54434]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:37:12 vmfsppjb006 powershell[54434]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 54434 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:37:19 vmfsppjb006 powershell[54463]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:37:19 vmfsppjb006 powershell[54463]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 54463 in AppDomain: None.
Oct 27 20:37:19 vmfsppjb006 powershell[54463]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:37:19 vmfsppjb006 powershell[54463]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 54463 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:37:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:37:37 vmfsppjb006 dbus-daemon[54499]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:37:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:37:38 vmfsppjb006 setroubleshoot[54499]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:37:38 vmfsppjb006 setroubleshoot[54499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:37:38 vmfsppjb006 platform-python[54499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:38:33 vmfsppjb006 powershell[54556]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:38:33 vmfsppjb006 powershell[54556]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 54556 in AppDomain: None.
Oct 27 20:38:34 vmfsppjb006 powershell[54556]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:38:34 vmfsppjb006 powershell[54556]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 54556 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 20:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 20:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 20:39:01 vmfsppjb006 systemd[1]: Started Session 104 of user omsagent.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Starting D-Bus User Message Bus Socket.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Reached target Timers.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Reached target Paths.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Listening on D-Bus User Message Bus Socket.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Reached target Sockets.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Reached target Basic System.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Reached target Default.
Oct 27 20:39:01 vmfsppjb006 systemd[54606]: Startup finished in 44ms.
Oct 27 20:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 20:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Stopped target Default.
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Stopped target Basic System.
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Stopped target Timers.
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Stopped target Paths.
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Stopped target Sockets.
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Closed D-Bus User Message Bus Socket.
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Reached target Shutdown.
Oct 27 20:39:02 vmfsppjb006 systemd[54606]: Starting Exit the Session...
Oct 27 20:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 54648 (systemctl) with signal SIGKILL.
Oct 27 20:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 20:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 20:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 20:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 20:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:39:37 vmfsppjb006 dbus-daemon[54688]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:39:38 vmfsppjb006 setroubleshoot[54688]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:39:38 vmfsppjb006 setroubleshoot[54688]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:39:38 vmfsppjb006 platform-python[54688]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:40:16 vmfsppjb006 powershell[54737]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:40:16 vmfsppjb006 powershell[54737]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 54737 in AppDomain: None.
Oct 27 20:40:16 vmfsppjb006 powershell[54737]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:40:16 vmfsppjb006 powershell[54737]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 54737 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:40:35 vmfsppjb006 python3.6[1683]: 2021-10-27T11:40:35.142250Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 23;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 20:40:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:40:37 vmfsppjb006 dbus-daemon[54779]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:40:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:40:38 vmfsppjb006 setroubleshoot[54779]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:40:38 vmfsppjb006 setroubleshoot[54779]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:40:38 vmfsppjb006 platform-python[54779]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:43:56 vmfsppjb006 powershell[54974]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:43:56 vmfsppjb006 powershell[54974]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 54974 in AppDomain: None.
Oct 27 20:43:56 vmfsppjb006 powershell[54974]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:43:57 vmfsppjb006 powershell[54974]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 54974 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:44:07 vmfsppjb006 powershell[55003]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:44:07 vmfsppjb006 powershell[55003]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 55003 in AppDomain: None.
Oct 27 20:44:07 vmfsppjb006 powershell[55003]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:44:07 vmfsppjb006 powershell[55003]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 55003 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:44:13 vmfsppjb006 powershell[55021]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:44:13 vmfsppjb006 powershell[55021]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 55021 in AppDomain: None.
Oct 27 20:44:13 vmfsppjb006 powershell[55021]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:44:13 vmfsppjb006 powershell[55021]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 55021 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:44:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:44:37 vmfsppjb006 dbus-daemon[55068]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:44:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:44:38 vmfsppjb006 setroubleshoot[55068]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:44:38 vmfsppjb006 setroubleshoot[55068]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:44:38 vmfsppjb006 platform-python[55068]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:45:37 vmfsppjb006 dbus-daemon[55136]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:45:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:45:38 vmfsppjb006 setroubleshoot[55136]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:45:38 vmfsppjb006 setroubleshoot[55136]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:45:38 vmfsppjb006 platform-python[55136]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:46:21 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 20:46:22 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 20:46:22 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 20:48:10 vmfsppjb006 powershell[55368]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:48:10 vmfsppjb006 powershell[55368]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 55368 in AppDomain: None.
Oct 27 20:48:10 vmfsppjb006 powershell[55368]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:48:11 vmfsppjb006 powershell[55368]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 55368 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:48:19 vmfsppjb006 powershell[55397]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:48:19 vmfsppjb006 powershell[55397]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 55397 in AppDomain: None.
Oct 27 20:48:19 vmfsppjb006 powershell[55397]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:48:19 vmfsppjb006 powershell[55397]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 55397 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:48:23 vmfsppjb006 powershell[55415]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:48:23 vmfsppjb006 powershell[55415]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 55415 in AppDomain: None.
Oct 27 20:48:23 vmfsppjb006 powershell[55415]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:48:23 vmfsppjb006 powershell[55415]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 55415 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:48:31 vmfsppjb006 powershell[55441]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:48:31 vmfsppjb006 powershell[55441]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 55441 in AppDomain: None.
Oct 27 20:48:31 vmfsppjb006 powershell[55441]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:48:31 vmfsppjb006 powershell[55441]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 55441 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:48:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:48:37 vmfsppjb006 dbus-daemon[55469]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:48:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:48:38 vmfsppjb006 setroubleshoot[55469]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:48:38 vmfsppjb006 setroubleshoot[55469]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:48:38 vmfsppjb006 platform-python[55469]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:49:39 vmfsppjb006 finsrvpf[55538]: This is Error
Oct 27 20:50:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:50:37 vmfsppjb006 dbus-daemon[55588]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:50:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:50:38 vmfsppjb006 setroubleshoot[55588]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:50:38 vmfsppjb006 setroubleshoot[55588]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:50:38 vmfsppjb006 platform-python[55588]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Started Session 106 of user omsagent.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Starting D-Bus User Message Bus Socket.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Reached target Paths.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Reached target Timers.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Listening on D-Bus User Message Bus Socket.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Reached target Sockets.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Reached target Basic System.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Reached target Default.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Startup finished in 44ms.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Stopped target Default.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Stopped target Basic System.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Stopped target Sockets.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Closed D-Bus User Message Bus Socket.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Stopped target Timers.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Stopped target Paths.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Reached target Shutdown.
Oct 27 20:54:01 vmfsppjb006 systemd[55793]: Starting Exit the Session...
Oct 27 20:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 55834 (systemctl) with signal SIGKILL.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 20:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 20:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:54:37 vmfsppjb006 dbus-daemon[55874]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:54:38 vmfsppjb006 setroubleshoot[55874]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:54:38 vmfsppjb006 setroubleshoot[55874]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:54:38 vmfsppjb006 platform-python[55874]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:55:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:55:37 vmfsppjb006 dbus-daemon[55942]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:55:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:55:38 vmfsppjb006 setroubleshoot[55942]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:55:39 vmfsppjb006 setroubleshoot[55942]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:55:39 vmfsppjb006 platform-python[55942]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:58:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 20:58:37 vmfsppjb006 dbus-daemon[56120]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 20:58:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 20:58:38 vmfsppjb006 setroubleshoot[56120]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 20:58:39 vmfsppjb006 setroubleshoot[56120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 20:58:39 vmfsppjb006 platform-python[56120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 20:59:04 vmfsppjb006 powershell[56161]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:59:04 vmfsppjb006 powershell[56161]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 56161 in AppDomain: None.
Oct 27 20:59:04 vmfsppjb006 powershell[56161]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:59:05 vmfsppjb006 powershell[56161]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 56161 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 20:59:41 vmfsppjb006 powershell[56208]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 20:59:41 vmfsppjb006 powershell[56208]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 56208 in AppDomain: None.
Oct 27 20:59:41 vmfsppjb006 powershell[56208]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 20:59:41 vmfsppjb006 finsrvpf[56225]: start
Oct 27 20:59:41 vmfsppjb006 powershell[56208]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 56208 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 21:00:10 vmfsppjb006 powershell[56261]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 21:00:10 vmfsppjb006 powershell[56261]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 56261 in AppDomain: None.
Oct 27 21:00:10 vmfsppjb006 powershell[56261]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 21:00:10 vmfsppjb006 finsrvpf[56278]: start
Oct 27 21:00:10 vmfsppjb006 powershell[56261]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 56261 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 21:04:02 vmfsppjb006 powershell[56513]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 21:04:02 vmfsppjb006 powershell[56513]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 56513 in AppDomain: None.
Oct 27 21:04:02 vmfsppjb006 powershell[56513]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 21:04:02 vmfsppjb006 finsrvpf[56533]: 
Oct 27 21:04:02 vmfsppjb006 powershell[56513]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 56513 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 21:04:49 vmfsppjb006 powershell[56577]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 21:04:49 vmfsppjb006 powershell[56577]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 56577 in AppDomain: None.
Oct 27 21:04:49 vmfsppjb006 powershell[56577]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 21:04:49 vmfsppjb006 powershell[56577]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 56577 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 21:05:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:05:37 vmfsppjb006 dbus-daemon[56641]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:05:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:05:38 vmfsppjb006 setroubleshoot[56641]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:05:39 vmfsppjb006 setroubleshoot[56641]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:05:39 vmfsppjb006 platform-python[56641]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:05:44 vmfsppjb006 powershell[56656]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 21:05:44 vmfsppjb006 powershell[56656]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 56656 in AppDomain: None.
Oct 27 21:05:44 vmfsppjb006 powershell[56656]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 21:05:44 vmfsppjb006 finsrvpf[56676]: 
Oct 27 21:05:44 vmfsppjb006 powershell[56656]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 56656 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 21:07:15 vmfsppjb006 powershell[56773]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 21:07:15 vmfsppjb006 powershell[56773]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 56773 in AppDomain: None.
Oct 27 21:07:15 vmfsppjb006 powershell[56773]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 21:07:15 vmfsppjb006 finsrvpf[56790]: start rg
Oct 27 21:07:15 vmfsppjb006 powershell[56773]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 56773 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 21:08:47 vmfsppjb006 python3.6[1683]: 2021-10-27T12:08:47.589260Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Started Session 108 of user omsagent.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Starting D-Bus User Message Bus Socket.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Reached target Timers.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Reached target Paths.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Listening on D-Bus User Message Bus Socket.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Reached target Sockets.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Reached target Basic System.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Reached target Default.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Startup finished in 47ms.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Stopped target Default.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Stopped target Basic System.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Stopped target Timers.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Stopped target Paths.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Stopped target Sockets.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Closed D-Bus User Message Bus Socket.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Reached target Shutdown.
Oct 27 21:09:02 vmfsppjb006 systemd[56888]: Starting Exit the Session...
Oct 27 21:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 56929 (systemctl) with signal SIGKILL.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 21:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 21:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:09:37 vmfsppjb006 dbus-daemon[56974]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:09:38 vmfsppjb006 setroubleshoot[56974]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:09:39 vmfsppjb006 setroubleshoot[56974]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:09:39 vmfsppjb006 platform-python[56974]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:10:06 vmfsppjb006 powershell[57007]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 21:10:07 vmfsppjb006 powershell[57007]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 57007 in AppDomain: None.
Oct 27 21:10:07 vmfsppjb006 powershell[57007]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 21:10:07 vmfsppjb006 finsrvpf[57024]: オペレーション:start リソースグループ:rg 仮想マシン:
Oct 27 21:10:07 vmfsppjb006 powershell[57007]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 57007 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 21:10:35 vmfsppjb006 python3.6[1683]: 2021-10-27T12:10:35.963270Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 24;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 21:10:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:10:37 vmfsppjb006 dbus-daemon[57060]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:10:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:10:38 vmfsppjb006 setroubleshoot[57060]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:10:39 vmfsppjb006 setroubleshoot[57060]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:10:39 vmfsppjb006 platform-python[57060]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:16:24 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 27 21:16:24 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 27 21:16:24 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 27 21:16:24 vmfsppjb006 systemd[1]: Started Session c5 of user root.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Reached target Paths.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Reached target Timers.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Starting D-Bus User Message Bus Socket.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Listening on D-Bus User Message Bus Socket.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Reached target Sockets.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Reached target Basic System.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Reached target Default.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Startup finished in 46ms.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Stopped target Default.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Stopped target Basic System.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Stopped target Paths.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Stopped target Sockets.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Closed D-Bus User Message Bus Socket.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Reached target Shutdown.
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Starting Exit the Session...
Oct 27 21:16:25 vmfsppjb006 systemd[57463]: Stopped target Timers.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: user@0.service: Killing process 57502 (systemctl) with signal SIGKILL.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 27 21:16:25 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 27 21:16:25 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 27 21:16:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:16:37 vmfsppjb006 dbus-daemon[57531]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:16:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:16:38 vmfsppjb006 setroubleshoot[57531]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:16:39 vmfsppjb006 setroubleshoot[57531]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:16:39 vmfsppjb006 platform-python[57531]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:19:10 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 21:19:11 vmfsppjb006 dnf[57671]: packages-microsoft-com-prod                      13 kB/s | 3.0 kB     00:00
Oct 27 21:19:11 vmfsppjb006 dnf[57671]: MySQL 8.0 Community Server                       19 kB/s | 2.6 kB     00:00
Oct 27 21:19:11 vmfsppjb006 dnf[57671]: MySQL Connectors Community                      254 kB/s | 2.6 kB     00:00
Oct 27 21:19:11 vmfsppjb006 dnf[57671]: MySQL Tools Community                            79 kB/s | 2.6 kB     00:00
Oct 27 21:19:12 vmfsppjb006 dnf[57671]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  3.7 kB/s | 2.4 kB     00:00
Oct 27 21:19:12 vmfsppjb006 dnf[57671]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.8 kB/s | 2.8 kB     00:00
Oct 27 21:19:13 vmfsppjb006 dnf[57671]: Microsoft Azure RPMs for RHEL8 Extended Update  5.2 kB/s | 2.1 kB     00:00
Oct 27 21:19:13 vmfsppjb006 dnf[57671]: Zabbix Official Repository - x86_64              11 kB/s | 2.9 kB     00:00
Oct 27 21:19:13 vmfsppjb006 dnf[57671]: Zabbix Official Repository non-supported - x86_  13 kB/s | 3.0 kB     00:00
Oct 27 21:19:14 vmfsppjb006 dnf[57671]: Metadata cache created.
Oct 27 21:19:14 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 21:19:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:19:37 vmfsppjb006 dbus-daemon[57715]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:19:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:19:38 vmfsppjb006 setroubleshoot[57715]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:19:39 vmfsppjb006 setroubleshoot[57715]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:19:39 vmfsppjb006 platform-python[57715]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 21:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 21:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 21:24:01 vmfsppjb006 systemd[1]: Started Session 111 of user omsagent.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Starting D-Bus User Message Bus Socket.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Reached target Paths.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Reached target Timers.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Listening on D-Bus User Message Bus Socket.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Reached target Sockets.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Reached target Basic System.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Reached target Default.
Oct 27 21:24:01 vmfsppjb006 systemd[57965]: Startup finished in 47ms.
Oct 27 21:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 21:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Stopped target Default.
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Stopped target Basic System.
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Stopped target Timers.
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Stopped target Paths.
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Stopped target Sockets.
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Closed D-Bus User Message Bus Socket.
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Reached target Shutdown.
Oct 27 21:24:02 vmfsppjb006 systemd[57965]: Starting Exit the Session...
Oct 27 21:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 58008 (systemctl) with signal SIGKILL.
Oct 27 21:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 21:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 21:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 21:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 21:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:24:37 vmfsppjb006 dbus-daemon[58059]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:24:37 vmfsppjb006 setroubleshoot[58059]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:24:38 vmfsppjb006 setroubleshoot[58059]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:24:38 vmfsppjb006 platform-python[58059]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:30:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:30:37 vmfsppjb006 dbus-daemon[58402]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:30:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:30:37 vmfsppjb006 setroubleshoot[58402]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:30:38 vmfsppjb006 setroubleshoot[58402]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:30:38 vmfsppjb006 platform-python[58402]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:34:25 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 21:34:26 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 21:34:26 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 21:38:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:38:37 vmfsppjb006 dbus-daemon[58928]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:38:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:38:38 vmfsppjb006 setroubleshoot[58928]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:38:38 vmfsppjb006 setroubleshoot[58928]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:38:38 vmfsppjb006 platform-python[58928]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Started Session 113 of user omsagent.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Reached target Paths.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Reached target Timers.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Starting D-Bus User Message Bus Socket.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Listening on D-Bus User Message Bus Socket.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Reached target Sockets.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Reached target Basic System.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Reached target Default.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Startup finished in 46ms.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Stopped target Default.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Stopped target Basic System.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Stopped target Timers.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Stopped target Sockets.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Closed D-Bus User Message Bus Socket.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Stopped target Paths.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Reached target Shutdown.
Oct 27 21:39:01 vmfsppjb006 systemd[58969]: Starting Exit the Session...
Oct 27 21:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 59010 (systemctl) with signal SIGKILL.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 21:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 21:39:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:39:37 vmfsppjb006 dbus-daemon[59051]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:39:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:39:38 vmfsppjb006 setroubleshoot[59051]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:39:38 vmfsppjb006 setroubleshoot[59051]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:39:38 vmfsppjb006 platform-python[59051]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:40:36 vmfsppjb006 python3.6[1683]: 2021-10-27T12:40:36.000866Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 25;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 21:40:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:40:37 vmfsppjb006 dbus-daemon[59123]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:40:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:40:38 vmfsppjb006 setroubleshoot[59123]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:40:38 vmfsppjb006 setroubleshoot[59123]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:40:38 vmfsppjb006 platform-python[59123]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:45:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:45:37 vmfsppjb006 dbus-daemon[59400]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:45:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:45:38 vmfsppjb006 setroubleshoot[59400]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:45:38 vmfsppjb006 setroubleshoot[59400]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:45:38 vmfsppjb006 platform-python[59400]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 21:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 21:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 21:54:01 vmfsppjb006 systemd[1]: Started Session 115 of user omsagent.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Starting D-Bus User Message Bus Socket.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Reached target Timers.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Reached target Paths.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Listening on D-Bus User Message Bus Socket.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Reached target Sockets.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Reached target Basic System.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Reached target Default.
Oct 27 21:54:01 vmfsppjb006 systemd[59892]: Startup finished in 46ms.
Oct 27 21:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 21:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Stopped target Default.
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Stopped target Basic System.
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Stopped target Paths.
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Stopped target Timers.
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Stopped target Sockets.
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Closed D-Bus User Message Bus Socket.
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Reached target Shutdown.
Oct 27 21:54:02 vmfsppjb006 systemd[59892]: Starting Exit the Session...
Oct 27 21:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 59934 (systemctl) with signal SIGKILL.
Oct 27 21:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 21:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 21:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 21:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 21:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 21:54:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:54:37 vmfsppjb006 dbus-daemon[59983]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:54:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:54:38 vmfsppjb006 setroubleshoot[59983]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:54:38 vmfsppjb006 setroubleshoot[59983]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:54:38 vmfsppjb006 platform-python[59983]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:56:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 21:56:37 vmfsppjb006 dbus-daemon[60109]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 21:56:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 21:56:38 vmfsppjb006 setroubleshoot[60109]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 21:56:39 vmfsppjb006 setroubleshoot[60109]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 21:56:39 vmfsppjb006 platform-python[60109]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 21:58:28 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 21:58:29 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 21:58:29 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 22:01:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:01:37 vmfsppjb006 dbus-daemon[60484]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:01:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:01:38 vmfsppjb006 setroubleshoot[60484]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:01:39 vmfsppjb006 setroubleshoot[60484]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:01:39 vmfsppjb006 platform-python[60484]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:01:55 vmfsppjb006 powershell[60507]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 22:01:55 vmfsppjb006 powershell[60507]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 60507 in AppDomain: None.
Oct 27 22:01:55 vmfsppjb006 powershell[60507]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 22:01:55 vmfsppjb006 finsrvpf[60525]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ start ], ResourceGroupName:[ rg ], VirtualMachineName:[  ]
Oct 27 22:01:56 vmfsppjb006 powershell[60507]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 60507 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 22:05:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:05:37 vmfsppjb006 dbus-daemon[60739]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:05:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:05:38 vmfsppjb006 setroubleshoot[60739]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:05:39 vmfsppjb006 setroubleshoot[60739]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:05:39 vmfsppjb006 platform-python[60739]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:08:48 vmfsppjb006 python3.6[1683]: 2021-10-27T13:08:48.669858Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 27 22:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 22:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 22:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 22:09:01 vmfsppjb006 systemd[1]: Started Session 117 of user omsagent.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Starting D-Bus User Message Bus Socket.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Reached target Paths.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Reached target Timers.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Listening on D-Bus User Message Bus Socket.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Reached target Sockets.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Reached target Basic System.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Reached target Default.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Startup finished in 45ms.
Oct 27 22:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 22:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 22:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Stopped target Default.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Stopped target Basic System.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Stopped target Paths.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Stopped target Sockets.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Closed D-Bus User Message Bus Socket.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Reached target Shutdown.
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Starting Exit the Session...
Oct 27 22:09:01 vmfsppjb006 systemd[60940]: Stopped target Timers.
Oct 27 22:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 60982 (systemctl) with signal SIGKILL.
Oct 27 22:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 22:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 22:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 22:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 22:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 22:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 22:09:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:09:37 vmfsppjb006 dbus-daemon[61022]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:09:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:09:38 vmfsppjb006 setroubleshoot[61022]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:09:39 vmfsppjb006 setroubleshoot[61022]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:09:39 vmfsppjb006 platform-python[61022]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:10:37 vmfsppjb006 python3.6[1683]: 2021-10-27T13:10:37.049629Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 26;HeartbeatId: A1C6ECCD-8BFB-40D6-8468-9B69676270CB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 27 22:13:58 vmfsppjb006 powershell[61274]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 22:13:58 vmfsppjb006 powershell[61274]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 61274 in AppDomain: None.
Oct 27 22:13:58 vmfsppjb006 powershell[61274]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: c6222ced-da97-4893-861a-25427fdc81ab#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:13:59 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 449e220b-5b55-443e-8381-3484e64813d7#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = f3b0bfb1-221b-4b66-8f7d-d95d012fe67a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:12 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 27 22:14:12 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#0121nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wD
Oct 27 22:14:12 vmfsppjb006 powershell[61274]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 9e94c4e3-d03a-4b6c-b91e-20372ad5fd3e#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 22:14:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:14:37 vmfsppjb006 dbus-daemon[61344]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:14:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:14:38 vmfsppjb006 setroubleshoot[61344]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:14:39 vmfsppjb006 setroubleshoot[61344]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:14:39 vmfsppjb006 platform-python[61344]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:14:46 vmfsppjb006 powershell[61355]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 27 22:14:46 vmfsppjb006 powershell[61355]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 61355 in AppDomain: None.
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 6824e1e4-642d-4d80-a077-78cd103a9b75#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:47 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 15659cec-9949-4917-a36b-b76c75ae0a3d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 3a24d6ff-8b0b-4d2a-992e-413363acf5fd#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 27 22:14:59 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 27 22:14:59 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012MU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: d5181b1e-18ef-43b8-8115-c57e89076b3d#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 22:14:59 vmfsppjb006 powershell[61355]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 5b2b12fd-4807-4813-af7e-11514a4839ec#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 27 22:15:01 vmfsppjb006 finsrvpf[61392]: VM Start/Stop Script is failed. Cause:[ Command failed ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-xxx ], VirtualMachineName:[ vmfsppjb004 ]
Oct 27 22:15:01 vmfsppjb006 powershell[61355]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 61355 in AppDomain: None.  Error Message: Operation canceled.
Oct 27 22:15:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:15:37 vmfsppjb006 dbus-daemon[61440]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:15:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:15:38 vmfsppjb006 setroubleshoot[61440]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:15:39 vmfsppjb006 setroubleshoot[61440]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:15:39 vmfsppjb006 platform-python[61440]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:19:24 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 27 22:19:24 vmfsppjb006 dnf[61661]: Metadata cache refreshed recently.
Oct 27 22:19:24 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 27 22:19:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:19:37 vmfsppjb006 dbus-daemon[61683]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:19:38 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:19:38 vmfsppjb006 setroubleshoot[61683]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:19:39 vmfsppjb006 setroubleshoot[61683]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:19:39 vmfsppjb006 platform-python[61683]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:22:31 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 22:22:32 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 27 22:22:32 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 27 22:23:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:23:37 vmfsppjb006 dbus-daemon[61983]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:23:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:23:37 vmfsppjb006 setroubleshoot[61983]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:23:38 vmfsppjb006 setroubleshoot[61983]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:23:38 vmfsppjb006 platform-python[61983]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Started Session 119 of user omsagent.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Reached target Paths.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Starting D-Bus User Message Bus Socket.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Reached target Timers.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Listening on D-Bus User Message Bus Socket.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Reached target Sockets.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Reached target Basic System.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Reached target Default.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Startup finished in 45ms.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Stopped target Default.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Stopped target Basic System.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Stopped target Paths.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Stopped target Sockets.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Closed D-Bus User Message Bus Socket.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Reached target Shutdown.
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Starting Exit the Session...
Oct 27 22:24:01 vmfsppjb006 systemd[62024]: Stopped target Timers.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 62066 (systemctl) with signal SIGKILL.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 27 22:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 27 22:24:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:24:37 vmfsppjb006 dbus-daemon[62106]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:24:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:24:37 vmfsppjb006 setroubleshoot[62106]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:24:38 vmfsppjb006 setroubleshoot[62106]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:24:38 vmfsppjb006 platform-python[62106]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:25:37 vmfsppjb006 dbus-daemon[888]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=856 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 27 22:25:37 vmfsppjb006 dbus-daemon[62171]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 27 22:25:37 vmfsppjb006 dbus-daemon[888]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 27 22:25:37 vmfsppjb006 setroubleshoot[62171]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 27 22:25:38 vmfsppjb006 setroubleshoot[62171]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 27 22:25:38 vmfsppjb006 platform-python[62171]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 27 22:30:00 vmfsppjb006 systemd-logind[931]: Session 5 logged out. Waiting for processes to exit.
Oct 27 22:30:00 vmfsppjb006 systemd-logind[931]: Removed session 5.
Oct 27 22:30:05 vmfsppjb006 systemd-logind[931]: Session 9 logged out. Waiting for processes to exit.
Oct 27 22:30:05 vmfsppjb006 systemd-logind[931]: Removed session 9.
Oct 27 22:30:09 vmfsppjb006 systemd-logind[931]: Session 30 logged out. Waiting for processes to exit.
Oct 27 22:30:09 vmfsppjb006 systemd-logind[931]: Removed session 30.
Oct 27 22:30:09 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 27 22:30:09 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1000...
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Stopped target Default.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Stopped target Basic System.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Stopped target Paths.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Stopped target Timers.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Stopped target Sockets.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Closed D-Bus User Message Bus Socket.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Reached target Shutdown.
Oct 27 22:30:09 vmfsppjb006 systemd[8583]: Starting Exit the Session...
Oct 27 22:30:09 vmfsppjb006 systemd[1]: user@1000.service: Killing process 62438 (systemctl) with signal SIGKILL.
Oct 27 22:30:09 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 27 22:30:09 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1000.
Oct 27 22:30:09 vmfsppjb006 systemd[1]: user-runtime-dir@1000.service: Unit not needed anymore. Stopping.
Oct 27 22:30:09 vmfsppjb006 systemd[1]: Stopping /run/user/1000 mount wrapper...
Oct 27 22:30:09 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1000.
Oct 27 22:30:09 vmfsppjb006 systemd[1]: Stopped /run/user/1000 mount wrapper.
Oct 27 22:30:42 vmfsppjb006 kernel: hv_utils: Shutdown request received - graceful shutdown initiated
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping LVM event activation on device 8:2...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Removed slice system-user\x2druntime\x2ddir.slice.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Closed LVM2 poll daemon socket.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Unmounting /mnt...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Hyper-V KVP daemon...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped target Cloud-init target.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped Execute cloud user/final scripts.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped Apply the settings specified in cloud-config.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped target Cloud-config availability.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped target Multi-User System.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped target Login Prompts.
Oct 27 22:30:42 vmfsppjb006 chronyd[902]: chronyd exiting
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Getty on tty1...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Serial Getty on ttyS0...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping The PHP FastCGI Process Manager...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping NTP client/server...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Command Scheduler...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Azure Linux Agent...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Login Service...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Self Monitoring and Reporting Technology (SMART) Daemon...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping OpenSSH server daemon...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Jobarranger Server...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Zabbix Server...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Jobarranger Agent...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Job spooling tools...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Enable periodic update of entitlement certificates....
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Machine Check Exception Logging Daemon...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping OMI CIM Server...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping VDO volume services...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping The Apache HTTP Server...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Dynamic System Tuning Daemon...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped target Timers.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped dnf makecache --timer.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped Daily Cleanup of Temporary Directories.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopped daily update of the root trust anchor for DNSSEC.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping System Logging Service...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Jobarranger Monitor...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Removed slice system-sshd\x2dkeygen.slice.
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping libstoragemgmt plug-in server daemon...
Oct 27 22:30:42 vmfsppjb006 systemd[1]: Stopping Restore /run/initramfs on shutdown...
Oct 28 09:05:51 vmfsppjb006 kernel: Command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Oct 28 09:05:51 vmfsppjb006 kernel: x86/fpu: Enabled xstate features 0xff, context size is 2560 bytes, using 'compacted' format.
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-provided physical RAM map:
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ffeffff] usable
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003fff0000-0x000000003fffefff] ACPI data
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] ACPI NVS
Oct 28 09:05:51 vmfsppjb006 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable
Oct 28 09:05:51 vmfsppjb006 kernel: printk: bootconsole [earlyser0] enabled
Oct 28 09:05:51 vmfsppjb006 kernel: NX (Execute Disable) protection: active
Oct 28 09:05:51 vmfsppjb006 kernel: SMBIOS 2.3 present.
Oct 28 09:05:51 vmfsppjb006 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008  12/07/2018
Oct 28 09:05:51 vmfsppjb006 kernel: Hypervisor detected: Microsoft Hyper-V
Oct 28 09:05:51 vmfsppjb006 kernel: Hyper-V: features 0x2e7f, hints 0x60c2c
Oct 28 09:05:51 vmfsppjb006 kernel: Hyper-V Host Build:18362-10.0-3-0.3356
Oct 28 09:05:51 vmfsppjb006 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40
Oct 28 09:05:51 vmfsppjb006 kernel: tsc: Marking TSC unstable due to running on Hyper-V
Oct 28 09:05:51 vmfsppjb006 kernel: Hyper-V: Using hypercall for remote TLB flush
Oct 28 09:05:51 vmfsppjb006 kernel: tsc: Detected 2593.909 MHz processor
Oct 28 09:05:51 vmfsppjb006 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000
Oct 28 09:05:51 vmfsppjb006 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct 28 09:05:51 vmfsppjb006 kernel: last_pfn = 0x3fff0 max_arch_pfn = 0x400000000
Oct 28 09:05:51 vmfsppjb006 kernel: found SMP MP-table at [mem 0x000ff780-0x000ff78f]
Oct 28 09:05:51 vmfsppjb006 kernel: kexec: Reserving the low 1M of memory for crashkernel
Oct 28 09:05:51 vmfsppjb006 kernel: Using GB pages for direct mapping
Oct 28 09:05:51 vmfsppjb006 kernel: RAMDISK: [mem 0x34c8a000-0x3663cfff]
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Early table checksum verification disabled
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: RSDP 0x00000000000F5C00 000014 (v00 ACPIAM)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: RSDT 0x000000003FFF0000 000040 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: FACP 0x000000003FFF0200 000081 (v02 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: DSDT 0x000000003FFF1D24 003CD5 (v01 MSFTVM MSFTVM02 00000002 INTL 02002026)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: FACS 0x000000003FFFF000 000040
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: WAET 0x000000003FFF1A80 000028 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SLIC 0x000000003FFF1AC0 000176 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: OEM0 0x000000003FFF1CC0 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SRAT 0x000000003FFF0800 000130 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: APIC 0x000000003FFF0300 00005A (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: OEMB 0x000000003FFFF040 000064 (v01 VRTUAL MICROSFT 12001807 MSFT 00000097)
Oct 28 09:05:51 vmfsppjb006 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x13fffffff] hotplug
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x140200000-0xfdfffffff] hotplug
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000200000-0x1ffffffffff] hotplug
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000200000-0x3ffffffffff] hotplug
Oct 28 09:05:51 vmfsppjb006 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x13fffffff] -> [mem 0x00000000-0x13fffffff]
Oct 28 09:05:51 vmfsppjb006 kernel: NODE_DATA(0) allocated [mem 0x13ffd6000-0x13fffffff]
Oct 28 09:05:51 vmfsppjb006 kernel: Using crashkernel=auto, the size chosen is a best effort estimation.
Oct 28 09:05:51 vmfsppjb006 kernel: Reserving 160MB of memory at 672MB for crashkernel (System RAM: 2047MB)
Oct 28 09:05:51 vmfsppjb006 kernel: Zone ranges:
Oct 28 09:05:51 vmfsppjb006 kernel:  DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct 28 09:05:51 vmfsppjb006 kernel:  DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Oct 28 09:05:51 vmfsppjb006 kernel:  Normal   [mem 0x0000000100000000-0x000000013fffffff]
Oct 28 09:05:51 vmfsppjb006 kernel:  Device   empty
Oct 28 09:05:51 vmfsppjb006 kernel: Movable zone start for each node
Oct 28 09:05:51 vmfsppjb006 kernel: Early memory node ranges
Oct 28 09:05:51 vmfsppjb006 kernel:  node   0: [mem 0x0000000000001000-0x000000000009efff]
Oct 28 09:05:51 vmfsppjb006 kernel:  node   0: [mem 0x0000000000100000-0x000000003ffeffff]
Oct 28 09:05:51 vmfsppjb006 kernel:  node   0: [mem 0x0000000100000000-0x000000013fffffff]
Oct 28 09:05:51 vmfsppjb006 kernel: Zeroed struct page in unavailable ranges: 114 pages
Oct 28 09:05:51 vmfsppjb006 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff]
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: PM-Timer IO Port: 0x408
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Oct 28 09:05:51 vmfsppjb006 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct 28 09:05:51 vmfsppjb006 kernel: Using ACPI (MADT) for SMP configuration information
Oct 28 09:05:51 vmfsppjb006 kernel: smpboot: Allowing 1 CPUs, 0 hotplug CPUs
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff]
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff]
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff]
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3fff0000-0x3fffefff]
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x3ffff000-0x3fffffff]
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registered nosave memory: [mem 0x40000000-0xffffffff]
Oct 28 09:05:51 vmfsppjb006 kernel: [mem 0x40000000-0xffffffff] available for PCI devices
Oct 28 09:05:51 vmfsppjb006 kernel: Booting paravirtualized kernel on bare hardware
Oct 28 09:05:51 vmfsppjb006 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct 28 09:05:51 vmfsppjb006 kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:1 nr_cpu_ids:1 nr_node_ids:1
Oct 28 09:05:51 vmfsppjb006 kernel: percpu: Embedded 53 pages/cpu s180224 r8192 d28672 u2097152
Oct 28 09:05:51 vmfsppjb006 kernel: Hyper-V: PV spinlocks enabled
Oct 28 09:05:51 vmfsppjb006 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 515824
Oct 28 09:05:51 vmfsppjb006 kernel: Policy zone: Normal
Oct 28 09:05:51 vmfsppjb006 kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 28 09:05:51 vmfsppjb006 kernel: Specific versions of hardware are certified with Red Hat Enterprise Linux 8. Please see the list of hardware certified with Red Hat Enterprise Linux 8 at https://access.redhat.com/ecosystem.
Oct 28 09:05:51 vmfsppjb006 kernel: Memory: 922868K/2096696K available (12292K kernel code, 2152K rwdata, 3852K rodata, 2408K init, 6468K bss, 324976K reserved, 0K cma-reserved)
Oct 28 09:05:51 vmfsppjb006 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Oct 28 09:05:51 vmfsppjb006 kernel: Kernel/User page tables isolation: enabled
Oct 28 09:05:51 vmfsppjb006 kernel: ftrace: allocating 36349 entries in 142 pages
Oct 28 09:05:51 vmfsppjb006 kernel: rcu: Hierarchical RCU implementation.
Oct 28 09:05:51 vmfsppjb006 kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=1.
Oct 28 09:05:51 vmfsppjb006 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct 28 09:05:51 vmfsppjb006 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1
Oct 28 09:05:51 vmfsppjb006 kernel: NR_IRQS: 524544, nr_irqs: 256, preallocated irqs: 16
Oct 28 09:05:51 vmfsppjb006 kernel: random: get_random_bytes called from start_kernel+0x36b/0x55b with crng_init=0
Oct 28 09:05:51 vmfsppjb006 kernel: Console: colour VGA+ 80x25
Oct 28 09:05:51 vmfsppjb006 kernel: printk: console [tty1] enabled
Oct 28 09:05:51 vmfsppjb006 kernel: printk: console [ttyS0] enabled
Oct 28 09:05:51 vmfsppjb006 kernel: printk: bootconsole [earlyser0] disabled
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Core revision 20190703
Oct 28 09:05:51 vmfsppjb006 kernel: APIC: Switch to symmetric I/O mode setup
Oct 28 09:05:51 vmfsppjb006 kernel: Hyper-V: Using IPI hypercalls
Oct 28 09:05:51 vmfsppjb006 kernel: Hyper-V: Using MSR based APIC access
Oct 28 09:05:51 vmfsppjb006 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns
Oct 28 09:05:51 vmfsppjb006 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
Oct 28 09:05:51 vmfsppjb006 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593909)
Oct 28 09:05:51 vmfsppjb006 kernel: pid_max: default: 32768 minimum: 301
Oct 28 09:05:51 vmfsppjb006 kernel: Security Framework initialized
Oct 28 09:05:51 vmfsppjb006 kernel: Yama: becoming mindful.
Oct 28 09:05:51 vmfsppjb006 kernel: SELinux:  Initializing.
Oct 28 09:05:51 vmfsppjb006 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Oct 28 09:05:51 vmfsppjb006 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Oct 28 09:05:51 vmfsppjb006 kernel: FEATURE SPEC_CTRL Not Present
Oct 28 09:05:51 vmfsppjb006 kernel: FEATURE IBPB_SUPPORT Not Present
Oct 28 09:05:51 vmfsppjb006 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct 28 09:05:51 vmfsppjb006 kernel: Spectre V2 : Mitigation: Full generic retpoline
Oct 28 09:05:51 vmfsppjb006 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct 28 09:05:51 vmfsppjb006 kernel: Speculative Store Bypass: Vulnerable
Oct 28 09:05:51 vmfsppjb006 kernel: TAA: Mitigation: Clear CPU buffers
Oct 28 09:05:51 vmfsppjb006 kernel: MDS: Mitigation: Clear CPU buffers
Oct 28 09:05:51 vmfsppjb006 kernel: Freeing SMP alternatives memory: 32K
Oct 28 09:05:51 vmfsppjb006 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7)
Oct 28 09:05:51 vmfsppjb006 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Oct 28 09:05:51 vmfsppjb006 kernel: rcu: Hierarchical SRCU implementation.
Oct 28 09:05:51 vmfsppjb006 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Oct 28 09:05:51 vmfsppjb006 kernel: smp: Bringing up secondary CPUs ...
Oct 28 09:05:51 vmfsppjb006 kernel: smp: Brought up 1 node, 1 CPU
Oct 28 09:05:51 vmfsppjb006 kernel: smpboot: Max logical packages: 1
Oct 28 09:05:51 vmfsppjb006 kernel: smpboot: Total of 1 processors activated (5187.81 BogoMIPS)
Oct 28 09:05:51 vmfsppjb006 kernel: node 0 initialised, 212213 pages in 1ms
Oct 28 09:05:51 vmfsppjb006 kernel: devtmpfs: initialized
Oct 28 09:05:51 vmfsppjb006 kernel: x86/mm: Memory block size: 128MB
Oct 28 09:05:51 vmfsppjb006 kernel: PM: Registering ACPI NVS region [mem 0x3ffff000-0x3fffffff] (4096 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct 28 09:05:51 vmfsppjb006 kernel: futex hash table entries: 256 (order: 2, 16384 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: pinctrl core: initialized pinctrl subsystem
Oct 28 09:05:51 vmfsppjb006 kernel: NET: Registered protocol family 16
Oct 28 09:05:51 vmfsppjb006 kernel: audit: initializing netlink subsys (disabled)
Oct 28 09:05:51 vmfsppjb006 kernel: cpuidle: using governor menu
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: bus type PCI registered
Oct 28 09:05:51 vmfsppjb006 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct 28 09:05:51 vmfsppjb006 kernel: PCI: Using configuration type 1 for base access
Oct 28 09:05:51 vmfsppjb006 kernel: audit: type=2000 audit(1635379548.110:1): state=initialized audit_enabled=0 res=1
Oct 28 09:05:51 vmfsppjb006 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct 28 09:05:51 vmfsppjb006 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct 28 09:05:51 vmfsppjb006 kernel: cryptd: max_cpu_qlen set to 1000
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Added _OSI(Module Device)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Device)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Interpreter enabled
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: (supports S0 S5)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Using IOAPIC for interrupt routing
Oct 28 09:05:51 vmfsppjb006 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Oct 28 09:05:51 vmfsppjb006 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Oct 28 09:05:51 vmfsppjb006 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Oct 28 09:05:51 vmfsppjb006 kernel: PCI host bridge to bus 0000:00
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0xfe0000000-0xfffffffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [mem 0x40000000-0xfffbffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:00.0: [8086:7192] type 00 class 0x060000
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x010180
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.1: reg 0x20: [io  0xffa0-0xffaf]
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000
Oct 28 09:05:51 vmfsppjb006 kernel: * Found PM-Timer Bug on the chipset. Due to workarounds for a bug,#012* this clock source is slow. Consider trying other clock sources
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:07.3: quirk: [io  0x0400-0x043f] claimed by PIIX4 ACPI
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:08.0: [1414:5353] type 00 class 0x030000
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:08.0: reg 0x10: [mem 0xf8000000-0xfbffffff]
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 7 9 10 *11 12 14 15)
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 7 9 10 11 12 14 15) *0, disabled.
Oct 28 09:05:51 vmfsppjb006 kernel: iommu: Default domain type: Passthrough 
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: setting as boot VGA device
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:08.0: vgaarb: bridge control possible
Oct 28 09:05:51 vmfsppjb006 kernel: vgaarb: loaded
Oct 28 09:05:51 vmfsppjb006 kernel: SCSI subsystem initialized
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: bus type USB registered
Oct 28 09:05:51 vmfsppjb006 kernel: usbcore: registered new interface driver usbfs
Oct 28 09:05:51 vmfsppjb006 kernel: usbcore: registered new interface driver hub
Oct 28 09:05:51 vmfsppjb006 kernel: usbcore: registered new device driver usb
Oct 28 09:05:51 vmfsppjb006 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct 28 09:05:51 vmfsppjb006 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct 28 09:05:51 vmfsppjb006 kernel: PTP clock support registered
Oct 28 09:05:51 vmfsppjb006 kernel: EDAC MC: Ver: 3.0.0
Oct 28 09:05:51 vmfsppjb006 kernel: PCI: Using ACPI for IRQ routing
Oct 28 09:05:51 vmfsppjb006 kernel: NetLabel: Initializing
Oct 28 09:05:51 vmfsppjb006 kernel: NetLabel:  domain hash size = 128
Oct 28 09:05:51 vmfsppjb006 kernel: NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
Oct 28 09:05:51 vmfsppjb006 kernel: NetLabel:  unlabeled traffic allowed by default
Oct 28 09:05:51 vmfsppjb006 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page
Oct 28 09:05:51 vmfsppjb006 kernel: VFS: Disk quotas dquot_6.6.0
Oct 28 09:05:51 vmfsppjb006 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: pnp: PnP ACPI init
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:06: [io  0x01e0-0x01ef] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:06: [io  0x0160-0x016f] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:06: [io  0x0278-0x027f] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:06: [io  0x0378-0x037f] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:06: [io  0x0678-0x067f] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:06: [io  0x0778-0x077f] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:06: [io  0x04d0-0x04d1] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:07: [io  0x0400-0x043f] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:07: [io  0x0370-0x0371] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:07: [io  0x0440-0x044f] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:07: [mem 0xfec00000-0xfec00fff] could not be reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:07: [mem 0xfee00000-0xfee00fff] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:08: [mem 0x00000000-0x0009ffff] could not be reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:08: [mem 0x000c0000-0x000dffff] could not be reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:08: [mem 0x000e0000-0x000fffff] could not be reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:08: [mem 0x00100000-0x3fffffff] could not be reserved
Oct 28 09:05:51 vmfsppjb006 kernel: system 00:08: [mem 0xfffc0000-0xffffffff] has been reserved
Oct 28 09:05:51 vmfsppjb006 kernel: pnp: PnP ACPI: found 9 devices
Oct 28 09:05:51 vmfsppjb006 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: resource 4 [mem 0xfe0000000-0xfffffffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: resource 5 [io  0x0000-0x0cf7 window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: resource 6 [io  0x0d00-0xffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: resource 7 [mem 0x000a0000-0x000bffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: pci_bus 0000:00: resource 8 [mem 0x40000000-0xfffbffff window]
Oct 28 09:05:51 vmfsppjb006 kernel: NET: Registered protocol family 2
Oct 28 09:05:51 vmfsppjb006 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Oct 28 09:05:51 vmfsppjb006 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes)
Oct 28 09:05:51 vmfsppjb006 kernel: NET: Registered protocol family 1
Oct 28 09:05:51 vmfsppjb006 kernel: NET: Registered protocol family 44
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Oct 28 09:05:51 vmfsppjb006 kernel: pci 0000:00:08.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Oct 28 09:05:51 vmfsppjb006 kernel: PCI: CLS 0 bytes, default 64
Oct 28 09:05:51 vmfsppjb006 kernel: Unpacking initramfs...
Oct 28 09:05:51 vmfsppjb006 kernel: Freeing initrd memory: 26316K
Oct 28 09:05:51 vmfsppjb006 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Oct 28 09:05:51 vmfsppjb006 kernel: software IO TLB: mapped [mem 0x3bff0000-0x3fff0000] (64MB)
Oct 28 09:05:51 vmfsppjb006 kernel: Initialise system trusted keyrings
Oct 28 09:05:51 vmfsppjb006 kernel: Key type blacklist registered
Oct 28 09:05:51 vmfsppjb006 kernel: workingset: timestamp_bits=36 max_order=19 bucket_order=0
Oct 28 09:05:51 vmfsppjb006 kernel: zbud: loaded
Oct 28 09:05:51 vmfsppjb006 kernel: pstore: using deflate compression
Oct 28 09:05:51 vmfsppjb006 kernel: Platform Keyring initialized
Oct 28 09:05:51 vmfsppjb006 kernel: NET: Registered protocol family 38
Oct 28 09:05:51 vmfsppjb006 kernel: Key type asymmetric registered
Oct 28 09:05:51 vmfsppjb006 kernel: Asymmetric key parser 'x509' registered
Oct 28 09:05:51 vmfsppjb006 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246)
Oct 28 09:05:51 vmfsppjb006 kernel: io scheduler mq-deadline registered
Oct 28 09:05:51 vmfsppjb006 kernel: io scheduler kyber registered
Oct 28 09:05:51 vmfsppjb006 kernel: io scheduler bfq registered
Oct 28 09:05:51 vmfsppjb006 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE
Oct 28 09:05:51 vmfsppjb006 kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
Oct 28 09:05:51 vmfsppjb006 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
Oct 28 09:05:51 vmfsppjb006 kernel: ACPI: Power Button [PWRF]
Oct 28 09:05:51 vmfsppjb006 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct 28 09:05:51 vmfsppjb006 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct 28 09:05:51 vmfsppjb006 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Oct 28 09:05:51 vmfsppjb006 kernel: Non-volatile memory driver v1.3
Oct 28 09:05:51 vmfsppjb006 kernel: rdac: device handler registered
Oct 28 09:05:51 vmfsppjb006 kernel: hp_sw: device handler registered
Oct 28 09:05:51 vmfsppjb006 kernel: emc: device handler registered
Oct 28 09:05:51 vmfsppjb006 kernel: alua: device handler registered
Oct 28 09:05:51 vmfsppjb006 kernel: libphy: Fixed MDIO Bus: probed
Oct 28 09:05:51 vmfsppjb006 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Oct 28 09:05:51 vmfsppjb006 kernel: ehci-pci: EHCI PCI platform driver
Oct 28 09:05:51 vmfsppjb006 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Oct 28 09:05:51 vmfsppjb006 kernel: ohci-pci: OHCI PCI platform driver
Oct 28 09:05:51 vmfsppjb006 kernel: uhci_hcd: USB Universal Host Controller Interface driver
Oct 28 09:05:51 vmfsppjb006 kernel: usbcore: registered new interface driver usbserial_generic
Oct 28 09:05:51 vmfsppjb006 kernel: usbserial: USB Serial support registered for generic
Oct 28 09:05:51 vmfsppjb006 kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12
Oct 28 09:05:51 vmfsppjb006 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Oct 28 09:05:51 vmfsppjb006 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Oct 28 09:05:51 vmfsppjb006 kernel: mousedev: PS/2 mouse device common for all mice
Oct 28 09:05:51 vmfsppjb006 kernel: rtc_cmos 00:00: RTC can wake from S4
Oct 28 09:05:51 vmfsppjb006 kernel: rtc_cmos 00:00: registered as rtc0
Oct 28 09:05:51 vmfsppjb006 kernel: rtc_cmos 00:00: alarms up to one month, 114 bytes nvram
Oct 28 09:05:51 vmfsppjb006 kernel: intel_pstate: CPU model not supported
Oct 28 09:05:51 vmfsppjb006 kernel: hidraw: raw HID events driver (C) Jiri Kosina
Oct 28 09:05:51 vmfsppjb006 kernel: usbcore: registered new interface driver usbhid
Oct 28 09:05:51 vmfsppjb006 kernel: usbhid: USB HID core driver
Oct 28 09:05:51 vmfsppjb006 kernel: drop_monitor: Initializing network drop monitor service
Oct 28 09:05:51 vmfsppjb006 kernel: Initializing XFRM netlink socket
Oct 28 09:05:51 vmfsppjb006 kernel: NET: Registered protocol family 10
Oct 28 09:05:51 vmfsppjb006 kernel: Segment Routing with IPv6
Oct 28 09:05:51 vmfsppjb006 kernel: NET: Registered protocol family 17
Oct 28 09:05:51 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1
Oct 28 09:05:51 vmfsppjb006 kernel: mpls_gso: MPLS GSO support
Oct 28 09:05:51 vmfsppjb006 kernel: core: Using 1 MCE banks
Oct 28 09:05:51 vmfsppjb006 kernel: AVX2 version of gcm_enc/dec engaged.
Oct 28 09:05:51 vmfsppjb006 kernel: AES CTR mode by8 optimization enabled
Oct 28 09:05:51 vmfsppjb006 kernel: registered taskstats version 1
Oct 28 09:05:51 vmfsppjb006 kernel: Loading compiled-in X.509 certificates
Oct 28 09:05:51 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 6510a14606da3bfa607738428a62729c5d677293'
Oct 28 09:05:51 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80'
Oct 28 09:05:51 vmfsppjb006 kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8'
Oct 28 09:05:51 vmfsppjb006 kernel: zswap: loaded using pool lzo/zbud
Oct 28 09:05:51 vmfsppjb006 kernel: Key type big_key registered
Oct 28 09:05:51 vmfsppjb006 kernel: Key type encrypted registered
Oct 28 09:05:51 vmfsppjb006 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct 28 09:05:51 vmfsppjb006 kernel: ima: Allocated hash algorithm: sha1
Oct 28 09:05:51 vmfsppjb006 kernel: evm: Initialising EVM extended attributes:
Oct 28 09:05:51 vmfsppjb006 kernel: evm: security.selinux
Oct 28 09:05:51 vmfsppjb006 kernel: evm: security.ima
Oct 28 09:05:51 vmfsppjb006 kernel: evm: security.capability
Oct 28 09:05:51 vmfsppjb006 kernel: evm: HMAC attrs: 0x1
Oct 28 09:05:51 vmfsppjb006 kernel: rtc_cmos 00:00: setting system clock to 2021-10-28 00:05:50 UTC (1635379550)
Oct 28 09:05:51 vmfsppjb006 kernel: Unstable clock detected, switching default tracing clock to "global"#012If you want to keep using the local clock, then add:#012  "trace_clock=local"#012on the kernel command line
Oct 28 09:05:51 vmfsppjb006 kernel: Freeing unused decrypted memory: 2040K
Oct 28 09:05:51 vmfsppjb006 kernel: Freeing unused kernel memory: 2408K
Oct 28 09:05:51 vmfsppjb006 kernel: Write protecting the kernel read-only data: 18432k
Oct 28 09:05:51 vmfsppjb006 kernel: Freeing unused kernel memory: 2020K
Oct 28 09:05:51 vmfsppjb006 kernel: Freeing unused kernel memory: 244K
Oct 28 09:05:51 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Running in initial RAM disk.
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Set hostname to <pkrvmlk3jhumuhr>.
Oct 28 09:05:51 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Reached target Slices.
Oct 28 09:05:51 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Reached target Local File Systems.
Oct 28 09:05:51 vmfsppjb006 kernel: random: systemd: uninitialized urandom read (16 bytes read)
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Reached target Swap.
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Listening on Journal Socket.
Oct 28 09:05:51 vmfsppjb006 systemd[1]: Starting Create list of required static device nodes for the current kernel...
Oct 28 09:05:51 vmfsppjb006 kernel: psmouse serio1: trackpoint: failed to get extended button data, assuming 3 buttons
Oct 28 09:05:51 vmfsppjb006 systemd-journald[267]: Journal started
Oct 28 09:05:51 vmfsppjb006 systemd-journald[267]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 28 09:05:51 vmfsppjb006 rngd[262]: Initializing available sources
Oct 28 09:05:51 vmfsppjb006 rngd[262]: Failed to init entropy source hwrng
Oct 28 09:05:51 vmfsppjb006 rngd[262]: Enabling RDSEED rng support
Oct 28 09:05:51 vmfsppjb006 rngd[262]: Initializing entropy source rdrand
Oct 28 09:05:52 vmfsppjb006 systemd[1]: Started Create list of required static device nodes for the current kernel.
Oct 28 09:05:52 vmfsppjb006 systemd[1]: Started Apply Kernel Variables.
Oct 28 09:05:52 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 28 09:05:52 vmfsppjb006 systemd[1]: Starting Create Static Device Nodes in /dev...
Oct 28 09:05:52 vmfsppjb006 systemd[1]: Started Create Static Device Nodes in /dev.
Oct 28 09:05:52 vmfsppjb006 kernel: random: fast init done
Oct 28 09:05:53 vmfsppjb006 systemd[1]: Started Setup Virtual Console.
Oct 28 09:05:53 vmfsppjb006 systemd[1]: Starting dracut cmdline hook...
Oct 28 09:05:53 vmfsppjb006 dracut-cmdline[279]: dracut-8.2 (Ootpa) dracut-049-70.git20200228.el8
Oct 28 09:05:53 vmfsppjb006 dracut-cmdline[279]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt1)/vmlinuz-4.18.0-193.47.1.el8_2.x86_64 root=/dev/mapper/rootvg-rootlv ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300
Oct 28 09:05:53 vmfsppjb006 systemd[1]: Started dracut cmdline hook.
Oct 28 09:05:53 vmfsppjb006 systemd[1]: Starting dracut pre-udev hook...
Oct 28 09:05:53 vmfsppjb006 kernel: device-mapper: uevent: version 1.0.3
Oct 28 09:05:53 vmfsppjb006 kernel: device-mapper: ioctl: 4.39.0-ioctl (2018-04-03) initialised: dm-devel@redhat.com
Oct 28 09:05:53 vmfsppjb006 systemd[1]: Started dracut pre-udev hook.
Oct 28 09:05:53 vmfsppjb006 systemd[1]: Starting udev Kernel Device Manager...
Oct 28 09:05:54 vmfsppjb006 kernel: psmouse serio1: trackpoint: IBM TrackPoint firmware: 0x01, buttons: 3/3
Oct 28 09:05:54 vmfsppjb006 kernel: input: TPPS/2 IBM TrackPoint as /devices/platform/i8042/serio1/input/input3
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Starting udev Coldplug all Devices...
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Mounting Kernel Configuration File System...
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Mounted Kernel Configuration File System.
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Started udev Coldplug all Devices.
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 28 09:05:54 vmfsppjb006 systemd[1]: Starting dracut initqueue hook...
Oct 28 09:05:54 vmfsppjb006 kernel: hv_vmbus: Vmbus version:4.0
Oct 28 09:05:54 vmfsppjb006 kernel: hv_vmbus: Unknown GUID: c376c1c3-d276-48d2-90a9-c04748072c60
Oct 28 09:05:54 vmfsppjb006 systemd-udevd[431]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 28 09:05:55 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_keyboard
Oct 28 09:05:55 vmfsppjb006 kernel: hv_vmbus: registering driver hid_hyperv
Oct 28 09:05:55 vmfsppjb006 kernel: hv_vmbus: registering driver hv_storvsc
Oct 28 09:05:55 vmfsppjb006 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:07/VMBUS:01/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio2/input/input4
Oct 28 09:05:55 vmfsppjb006 kernel: scsi host0: storvsc_host_t
Oct 28 09:05:55 vmfsppjb006 kernel: scsi 0:0:0:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 28 09:05:55 vmfsppjb006 kernel: scsi host1: storvsc_host_t
Oct 28 09:05:55 vmfsppjb006 kernel: scsi 1:0:1:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct 28 09:05:55 vmfsppjb006 kernel: scsi host2: storvsc_host_t
Oct 28 09:05:55 vmfsppjb006 kernel: scsi host3: storvsc_host_t
Oct 28 09:05:55 vmfsppjb006 kernel: hv_vmbus: registering driver hv_netvsc
Oct 28 09:05:55 vmfsppjb006 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input5
Oct 28 09:05:55 vmfsppjb006 kernel: hid-generic 0006:045E:0621.0001: input: <UNKNOWN> HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on 
Oct 28 09:05:55 vmfsppjb006 kernel: ata_piix 0000:00:07.1: Hyper-V Virtual Machine detected, ATA device ignore set
Oct 28 09:05:55 vmfsppjb006 kernel: scsi host4: ata_piix
Oct 28 09:05:55 vmfsppjb006 kernel: scsi host5: ata_piix
Oct 28 09:05:55 vmfsppjb006 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0xffa0 irq 14
Oct 28 09:05:55 vmfsppjb006 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0xffa8 irq 15
Oct 28 09:05:55 vmfsppjb006 kernel: scsi 1:0:1:0: Attached scsi generic sg0 type 0
Oct 28 09:05:55 vmfsppjb006 kernel: scsi 0:0:0:0: Attached scsi generic sg1 type 0
Oct 28 09:05:55 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] 134217728 512-byte logical blocks: (68.7 GB/64.0 GiB)
Oct 28 09:05:55 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks
Oct 28 09:05:55 vmfsppjb006 kernel: sd 1:0:1:0: [sda] 8388608 512-byte logical blocks: (4.29 GB/4.00 GiB)
Oct 28 09:05:55 vmfsppjb006 kernel: sd 1:0:1:0: [sda] 4096-byte physical blocks
Oct 28 09:05:55 vmfsppjb006 kernel: sd 1:0:1:0: [sda] Write Protect is off
Oct 28 09:05:55 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] Write Protect is off
Oct 28 09:05:55 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA
Oct 28 09:05:55 vmfsppjb006 kernel: sd 1:0:1:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA
Oct 28 09:05:55 vmfsppjb006 kernel: sda: sda1
Oct 28 09:05:55 vmfsppjb006 kernel: sdb: sdb1 sdb2 sdb14 sdb15
Oct 28 09:05:55 vmfsppjb006 kernel: sd 1:0:1:0: [sda] Attached SCSI disk
Oct 28 09:05:55 vmfsppjb006 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk
Oct 28 09:05:55 vmfsppjb006 rngd[262]: Initializing AES buffer
Oct 28 09:05:55 vmfsppjb006 rngd[262]: Enabling JITTER rng support
Oct 28 09:05:55 vmfsppjb006 rngd[262]: Initializing entropy source jitter
Oct 28 09:05:55 vmfsppjb006 kernel: random: crng init done
Oct 28 09:05:55 vmfsppjb006 kernel: random: 7 urandom warning(s) missed due to ratelimiting
Oct 28 09:05:58 vmfsppjb006 systemd-udevd[433]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 28 09:05:58 vmfsppjb006 dracut-initqueue[436]: Scanning devices sdb2  for LVM volume groups
Oct 28 09:05:59 vmfsppjb006 dracut-initqueue[436]: Found volume group "rootvg" using metadata type lvm2
Oct 28 09:05:59 vmfsppjb006 dracut-initqueue[436]: 5 logical volume(s) in volume group "rootvg" now active
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Found device /dev/mapper/rootvg-rootlv.
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Started dracut initqueue hook.
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Reached target Remote File Systems (Pre).
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Reached target Remote File Systems.
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Reached target Initrd Root Device.
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Starting File System Check on /dev/mapper/rootvg-rootlv...
Oct 28 09:05:59 vmfsppjb006 systemd-fsck[567]: /usr/sbin/fsck.xfs: XFS file system.
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Started File System Check on /dev/mapper/rootvg-rootlv.
Oct 28 09:05:59 vmfsppjb006 systemd[1]: Mounting /sysroot...
Oct 28 09:05:59 vmfsppjb006 kernel: SGI XFS with ACLs, security attributes, no debug enabled
Oct 28 09:05:59 vmfsppjb006 kernel: XFS (dm-4): Mounting V5 Filesystem
Oct 28 09:06:00 vmfsppjb006 kernel: XFS (dm-4): Ending clean mount
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Mounted /sysroot.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Reached target Initrd Root File System.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Starting Reload Configuration from the Real Root...
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Reloading.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Mounting /sysroot/usr...
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Started Reload Configuration from the Real Root.
Oct 28 09:06:00 vmfsppjb006 kernel: XFS (dm-1): Mounting V5 Filesystem
Oct 28 09:06:00 vmfsppjb006 kernel: XFS (dm-1): Ending clean mount
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Mounted /sysroot/usr.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Reached target Initrd File Systems.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Reached target Initrd Default Target.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Starting dracut pre-pivot and cleanup hook...
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Started dracut pre-pivot and cleanup hook.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Starting Cleaning Up and Shutting Down Daemons...
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Stopped target Timers.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Stopped dracut pre-pivot and cleanup hook.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Stopped target Remote File Systems.
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Stopped target Remote File Systems (Pre).
Oct 28 09:06:00 vmfsppjb006 systemd[1]: Stopped dracut initqueue hook.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Initrd Default Target.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Basic System.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target System Initialization.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped Create Volatile Files and Directories.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopping udev Kernel Device Manager...
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Swap.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Local File Systems.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped Apply Kernel Variables.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Paths.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Sockets.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Initrd Root Device.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped target Slices.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped udev Coldplug all Devices.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped udev Kernel Device Manager.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Started Cleaning Up and Shutting Down Daemons.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon...
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped Create Static Device Nodes in /dev.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped Create list of required static device nodes for the current kernel.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped dracut pre-udev hook.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped dracut cmdline hook.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Closed udev Kernel Socket.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Closed udev Control Socket.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Starting Cleanup udevd DB...
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Started Cleanup udevd DB.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Reached target Switch Root.
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Starting Switch Root...
Oct 28 09:06:01 vmfsppjb006 systemd[1]: Switching root.
Oct 28 09:06:01 vmfsppjb006 systemd-journald[267]: Journal stopped
Oct 28 09:06:05 vmfsppjb006 systemd-journald[267]: Received SIGTERM from PID 1 (systemd).
Oct 28 09:06:05 vmfsppjb006 kernel: printk: systemd: 13 output lines suppressed due to ratelimiting
Oct 28 09:06:05 vmfsppjb006 kernel: SELinux:  policy capability network_peer_controls=1
Oct 28 09:06:05 vmfsppjb006 kernel: SELinux:  policy capability open_perms=1
Oct 28 09:06:05 vmfsppjb006 kernel: SELinux:  policy capability extended_socket_class=1
Oct 28 09:06:05 vmfsppjb006 kernel: SELinux:  policy capability always_check_network=0
Oct 28 09:06:05 vmfsppjb006 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct 28 09:06:05 vmfsppjb006 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct 28 09:06:05 vmfsppjb006 kernel: audit: type=1403 audit(1635379563.423:2): auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Successfully loaded SELinux policy in 1.925566s.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Relabelled /dev, /run and /sys/fs/cgroup in 19.507ms.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: systemd 239 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=legacy)
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Detected virtualization microsoft.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Detected architecture x86-64.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Set hostname to <vmfsppjb006>.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Stopped Switch Root.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: systemd-journald.service: Service has no hold-off time (RestartSec=0), scheduling restart.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Stopped Journal Service.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Starting Journal Service...
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Reached target Remote File Systems.
Oct 28 09:06:05 vmfsppjb006 systemd-journald[700]: Journal started
Oct 28 09:06:05 vmfsppjb006 systemd-journald[700]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 28 09:06:05 vmfsppjb006 systemd[702]: systemd-resolved.service: Failed at step NAMESPACE spawning /usr/lib/systemd/systemd-resolved: Read-only file system
Oct 28 09:06:05 vmfsppjb006 systemd-tmpfiles[725]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 28 09:06:05 vmfsppjb006 systemd-tmpfiles[725]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 28 09:06:05 vmfsppjb006 systemd[1]: Started udev Kernel Device Manager.
Oct 28 09:06:05 vmfsppjb006 systemd-resolved[724]: Positive Trust Anchors:
Oct 28 09:06:05 vmfsppjb006 systemd-resolved[724]: . IN DS 19036 8 2 49aac11d7b6f6446702e54a1607371607a1a41855200fd2ce1cdde32f24e8fb5
Oct 28 09:06:05 vmfsppjb006 systemd-resolved[724]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct 28 09:06:05 vmfsppjb006 systemd-resolved[724]: Negative trust anchors: 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct 28 09:06:05 vmfsppjb006 systemd-resolved[724]: Using system hostname 'vmfsppjb006'.
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Started Network Name Resolution.
Oct 28 09:06:06 vmfsppjb006 kernel: hv_vmbus: registering driver hyperv_fb
Oct 28 09:06:06 vmfsppjb006 kernel: hv_vmbus: registering driver hv_balloon
Oct 28 09:06:06 vmfsppjb006 kernel: hv_utils: Registering HyperV Utility Driver
Oct 28 09:06:06 vmfsppjb006 kernel: hv_vmbus: registering driver hv_utils
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Reached target Host and Network Name Lookups.
Oct 28 09:06:06 vmfsppjb006 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0
Oct 28 09:06:06 vmfsppjb006 kernel: hv_utils: Heartbeat IC version 3.0
Oct 28 09:06:06 vmfsppjb006 kernel: hv_utils: Shutdown IC version 3.0
Oct 28 09:06:06 vmfsppjb006 kernel: hv_utils: TimeSync IC version 4.0
Oct 28 09:06:06 vmfsppjb006 kernel: hyperv_fb: Screen resolution: 1152x864, Color depth: 32
Oct 28 09:06:06 vmfsppjb006 systemd-udevd[738]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 28 09:06:06 vmfsppjb006 kernel: Console: switching to colour frame buffer device 144x54
Oct 28 09:06:06 vmfsppjb006 kernel: piix4_smbus 0000:00:07.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr
Oct 28 09:06:06 vmfsppjb006 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6
Oct 28 09:06:06 vmfsppjb006 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Oct 28 09:06:06 vmfsppjb006 systemd-udevd[737]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Oct 28 09:06:06 vmfsppjb006 lvm[717]:  5 logical volume(s) in volume group "rootvg" monitored
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling.
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Found device Virtual_Disk Temporary_Storage.
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Reached target Local File Systems (Pre).
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Mounting /tmp...
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/by-uuid/F405-5B51...
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Mounting /boot...
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Mounting /home...
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Mounting /var...
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 28 09:06:06 vmfsppjb006 kernel: XFS (dm-0): Mounting V5 Filesystem
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Created slice system-lvm2\x2dpvscan.slice.
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Starting LVM event activation on device 8:18...
Oct 28 09:06:06 vmfsppjb006 kernel: XFS (sdb1): Mounting V5 Filesystem
Oct 28 09:06:06 vmfsppjb006 kernel: XFS (dm-2): Mounting V5 Filesystem
Oct 28 09:06:06 vmfsppjb006 systemd-fsck[798]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 28 09:06:06 vmfsppjb006 kernel: XFS (dm-3): Mounting V5 Filesystem
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 28 09:06:06 vmfsppjb006 systemd-fsck[788]: fsck.fat 4.1 (2017-01-24)
Oct 28 09:06:06 vmfsppjb006 systemd-fsck[788]: /dev/sdb15: 13 files, 883/63325 clusters
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/by-uuid/F405-5B51.
Oct 28 09:06:06 vmfsppjb006 lvm[811]:  pvscan[811] PV /dev/sdb2 online, VG rootvg is complete.
Oct 28 09:06:06 vmfsppjb006 lvm[811]:  pvscan[811] VG rootvg run autoactivation.
Oct 28 09:06:06 vmfsppjb006 lvm[811]:  PVID uevLg0-eCem-PQIV-0lUJ-ViuH-BQPi-C4PSIo read from /dev/sdb2 last written to /dev/sda2.
Oct 28 09:06:06 vmfsppjb006 lvm[811]:  pvscan[811] VG rootvg not using quick activation.
Oct 28 09:06:06 vmfsppjb006 lvm[811]:  5 logical volume(s) in volume group "rootvg" now active
Oct 28 09:06:06 vmfsppjb006 systemd[1]: Started LVM event activation on device 8:18.
Oct 28 09:06:07 vmfsppjb006 kernel: XFS (dm-2): Ending clean mount
Oct 28 09:06:07 vmfsppjb006 systemd[1]: Mounted /home.
Oct 28 09:06:07 vmfsppjb006 kernel: XFS (sdb1): Ending clean mount
Oct 28 09:06:07 vmfsppjb006 systemd[1]: Mounted /boot.
Oct 28 09:06:07 vmfsppjb006 systemd[1]: Mounting /boot/efi...
Oct 28 09:06:07 vmfsppjb006 systemd[1]: Mounted /boot/efi.
Oct 28 09:06:07 vmfsppjb006 kernel: XFS (dm-0): Ending clean mount
Oct 28 09:06:07 vmfsppjb006 systemd[1]: Mounted /tmp.
Oct 28 09:06:08 vmfsppjb006 kernel: XFS (dm-3): Ending clean mount
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Mounted /var.
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Reached target Local File Systems.
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Starting Restore /run/initramfs on shutdown...
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Starting Import network configuration from initramfs...
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Starting Load/Save Random Seed...
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Starting Flush Journal to Persistent Storage...
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Started Restore /run/initramfs on shutdown.
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Started Load/Save Random Seed.
Oct 28 09:06:08 vmfsppjb006 systemd-journald[700]: Runtime journal (/run/log/journal/9aff06cab51c42828be9d78aa3a1f8f1) is 8.0M, max 88.1M, 80.1M free.
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Started Flush Journal to Persistent Storage.
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Started Import network configuration from initramfs.
Oct 28 09:06:08 vmfsppjb006 systemd[1]: Starting Create Volatile Files and Directories...
Oct 28 09:06:09 vmfsppjb006 systemd-tmpfiles[863]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 28 09:06:09 vmfsppjb006 systemd-tmpfiles[863]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Create Volatile Files and Directories.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting Security Auditing Service...
Oct 28 09:06:09 vmfsppjb006 auditd[866]: audit dispatcher initialized with q_depth=400 and 1 active plugins
Oct 28 09:06:09 vmfsppjb006 auditd[866]: Init complete, auditd 3.0 listening for events (startup state enable)
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: /sbin/augenrules: No change
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: No rules
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: enabled 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: failure 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: pid 866
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: rate_limit 0
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog_limit 8192
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: lost 0
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog_wait_time 60000
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: enabled 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: failure 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: pid 866
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: rate_limit 0
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog_limit 8192
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: lost 0
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog_wait_time 60000
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: enabled 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: failure 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: pid 866
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: rate_limit 0
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog_limit 8192
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: lost 0
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog 1
Oct 28 09:06:09 vmfsppjb006 augenrules[871]: backlog_wait_time 60000
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Security Auditing Service.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting Update UTMP about System Boot/Shutdown...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Update UTMP about System Boot/Shutdown.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Reached target System Initialization.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started daily update of the root trust anchor for DNSSEC.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started dnf makecache --timer.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Listening on D-Bus System Message Bus Socket.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (pre-networking)...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Reached target Sockets.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Daily Cleanup of Temporary Directories.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Reached target Timers.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Reached target Basic System.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting VDO volume services...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting Netfilter Tables...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting Hardware RNG Entropy Gatherer Wake threshold service...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Machine Check Exception Logging Daemon.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting System Security Services Daemon...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting Authorization Manager...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting NTP client/server...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Reached target sshd-keygen.target.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started libstoragemgmt plug-in server daemon.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started D-Bus System Message Bus.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Self Monitoring and Reporting Technology (SMART) Daemon.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started irqbalance daemon.
Oct 28 09:06:09 vmfsppjb006 chronyd[908]: chronyd version 3.5 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 +DEBUG)
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Wake threshold service.
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Starting update of the root trust anchor for DNSSEC validation in unbound...
Oct 28 09:06:09 vmfsppjb006 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon.
Oct 28 09:06:09 vmfsppjb006 chronyd[908]: Frequency -11.706 +/- 0.055 ppm read from /var/lib/chrony/drift
Oct 28 09:06:09 vmfsppjb006 chronyd[908]: Using right/UTC timezone to obtain leap second data
Oct 28 09:06:09 vmfsppjb006 /usr/sbin/irqbalance[907]: Balancing is ineffective on systems with a single cpu.  Shutting down
Oct 28 09:06:10 vmfsppjb006 smartd[904]: smartd 6.6 2017-11-05 r4594 [x86_64-linux-4.18.0-193.47.1.el8_2.x86_64] (local build)
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Copyright (C) 2002-17, Bruce Allen, Christian Franke, www.smartmontools.org
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Opened configuration file /etc/smartmontools/smartd.conf
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Device: /dev/sda, opened
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Device: /dev/sda, [Msft     Virtual Disk     1.0 ], lu id: 0x6002248038454ee4dea3eea9c576474f, 4.29 GB
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Device: /dev/sdb, opened
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Device: /dev/sdb, [Msft     Virtual Disk     1.0 ], lu id: 0x600224809c49d3a7764b86f8bc8c4cd0, 68.7 GB
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Device: /dev/sdb, Bad IEC (SMART) mode page, err=5, skip device
Oct 28 09:06:10 vmfsppjb006 smartd[904]: Monitoring 0 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices
Oct 28 09:06:10 vmfsppjb006 systemd-resolved[724]: request_name_destroy_callback n_ref=1
Oct 28 09:06:10 vmfsppjb006 systemd[1]: Started Netfilter Tables.
Oct 28 09:06:10 vmfsppjb006 polkitd[899]: Started polkitd version 0.115
Oct 28 09:06:10 vmfsppjb006 systemd[1]: Started NTP client/server.
Oct 28 09:06:10 vmfsppjb006 rngd[912]: Initializing available sources
Oct 28 09:06:10 vmfsppjb006 rngd[912]: Failed to init entropy source hwrng
Oct 28 09:06:10 vmfsppjb006 rngd[912]: Enabling RDSEED rng support
Oct 28 09:06:10 vmfsppjb006 rngd[912]: Initializing entropy source rdrand
Oct 28 09:06:10 vmfsppjb006 systemd[1]: Started update of the root trust anchor for DNSSEC validation in unbound.
Oct 28 09:06:10 vmfsppjb006 sssd[897]: Starting up
Oct 28 09:06:10 vmfsppjb006 systemd[1]: Started Authorization Manager.
Oct 28 09:06:10 vmfsppjb006 systemd[1]: Starting firewalld - dynamic firewall daemon...
Oct 28 09:06:10 vmfsppjb006 sssd[be[implicit_files]][932]: Starting up
Oct 28 09:06:10 vmfsppjb006 sssd[nss][936]: Starting up
Oct 28 09:06:11 vmfsppjb006 systemd[1]: Started VDO volume services.
Oct 28 09:06:11 vmfsppjb006 systemd[1]: Started System Security Services Daemon.
Oct 28 09:06:11 vmfsppjb006 systemd[1]: Reached target User and Group Name Lookups.
Oct 28 09:06:11 vmfsppjb006 systemd[1]: Starting Login Service...
Oct 28 09:06:12 vmfsppjb006 systemd-logind[943]: New seat seat0.
Oct 28 09:06:12 vmfsppjb006 systemd-logind[943]: Watching system buttons on /dev/input/event0 (Power Button)
Oct 28 09:06:12 vmfsppjb006 systemd-logind[943]: Watching system buttons on /dev/input/event4 (AT Translated Set 2 keyboard)
Oct 28 09:06:12 vmfsppjb006 systemd-logind[943]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard)
Oct 28 09:06:12 vmfsppjb006 systemd[1]: Started Login Service.
Oct 28 09:06:12 vmfsppjb006 systemd[1]: Started firewalld - dynamic firewall daemon.
Oct 28 09:06:12 vmfsppjb006 firewalld[935]: WARNING: AllowZoneDrifting is enabled. This is considered an insecure configuration option. It will be removed in a future release. Please consider disabling it now.
Oct 28 09:06:13 vmfsppjb006 cloud-init[923]: Cloud-init v. 19.4 running 'init-local' at Thu, 28 Oct 2021 00:06:12 +0000. Up 23.22 seconds.
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Started Initial cloud-init job (pre-networking).
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Reached target Network (Pre).
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting Network Manager...
Oct 28 09:06:13 vmfsppjb006 NetworkManager[1056]: <info>  [1635379573.7446] NetworkManager (version 1.22.8-7.el8_2) is starting... (for the first time)
Oct 28 09:06:13 vmfsppjb006 NetworkManager[1056]: <info>  [1635379573.7467] Read config: /etc/NetworkManager/NetworkManager.conf
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Started Network Manager.
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Reached target Network.
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting MySQL Server...
Oct 28 09:06:13 vmfsppjb006 NetworkManager[1056]: <info>  [1635379573.7900] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager"
Oct 28 09:06:13 vmfsppjb006 NetworkManager[1056]: <info>  [1635379573.7943] manager[0x55c95271e090]: monitoring kernel firmware directory '/lib/firmware'.
Oct 28 09:06:13 vmfsppjb006 dbus-daemon[903]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.10' (uid=0 pid=1056 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting Jobarranger Agent...
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting The PHP FastCGI Process Manager...
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting Enable periodic update of entitlement certificates....
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting Dynamic System Tuning Daemon...
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting OMI CIM Server...
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting The Apache HTTP Server...
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Started Hyper-V KVP daemon.
Oct 28 09:06:13 vmfsppjb006 KVP[1075]: KVP starting; pid is:1075
Oct 28 09:06:13 vmfsppjb006 systemd[1]: Starting Network Manager Wait Online...
Oct 28 09:06:14 vmfsppjb006 systemd[1]: Started Enable periodic update of entitlement certificates..
Oct 28 09:06:14 vmfsppjb006 KVP[1075]: KVP LIC Version: 3.1
Oct 28 09:06:14 vmfsppjb006 kernel: hv_utils: KVP IC version 4.0
Oct 28 09:06:14 vmfsppjb006 systemd[1]: Starting Hostname Service...
Oct 28 09:06:14 vmfsppjb006 systemd[1]: jobarg-agentd.service: Can't open PID file /run/jobarranger/jobarg_agentd.pid (yet?) after start: No such file or directory
Oct 28 09:06:14 vmfsppjb006 systemd[1]: Started Jobarranger Agent.
Oct 28 09:06:14 vmfsppjb006 systemd[1]: omid.service: Can't open PID file /var/opt/omi/run/omiserver.pid (yet?) after start: No such file or directory
Oct 28 09:06:14 vmfsppjb006 systemd[1]: Started OMI CIM Server.
Oct 28 09:06:15 vmfsppjb006 httpd[1074]: AH00558: httpd: Could not reliably determine the server's fully qualified domain name, using ::1. Set the 'ServerName' directive globally to suppress this message
Oct 28 09:06:15 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.freedesktop.hostname1'
Oct 28 09:06:15 vmfsppjb006 systemd[1]: Started Hostname Service.
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3012] hostname: hostname: using hostnamed
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3014] hostname: hostname changed from (none) to "vmfsppjb006"
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3017] dns-mgr[0x55c952702250]: init: dns=default,systemd-resolved rc-manager=symlink
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3081] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-device-plugin-team.so)
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3083] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3087] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3090] manager: Networking is enabled by state file
Oct 28 09:06:15 vmfsppjb006 dbus-daemon[903]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.10' (uid=0 pid=1056 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0")
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3128] dhcp-init: Using DHCP client 'dhclient'
Oct 28 09:06:15 vmfsppjb006 systemd[1]: Starting Network Manager Script Dispatcher Service...
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3460] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.22.8-7.el8_2/libnm-settings-plugin-ifcfg-rh.so")
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3463] settings: Loaded settings plugin: keyfile (internal)
Oct 28 09:06:15 vmfsppjb006 systemd[1]: Started The Apache HTTP Server.
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3514] device (lo): carrier: link connected
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3520] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1)
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3648] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2)
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.3822] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external')
Oct 28 09:06:15 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 28 09:06:15 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Oct 28 09:06:15 vmfsppjb006 systemd[1]: Started Network Manager Script Dispatcher Service.
Oct 28 09:06:15 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Oct 28 09:06:15 vmfsppjb006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct 28 09:06:15 vmfsppjb006 httpd[1074]: Server configured, listening on: port 80
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.5000] device (eth0): carrier: link connected
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.5742] device (eth0): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed')
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.5842] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.5919] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03)
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.5929] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed')
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.5966] manager: NetworkManager state is now CONNECTING
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.5999] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed')
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.8297] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed')
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.8303] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds)
Oct 28 09:06:15 vmfsppjb006 NetworkManager[1056]: <info>  [1635379575.8611] dhcp4 (eth0): dhclient started with pid 1508
Oct 28 09:06:15 vmfsppjb006 systemd[1]: Started Dynamic System Tuning Daemon.
Oct 28 09:06:16 vmfsppjb006 dhclient[1508]: DHCPREQUEST on eth0 to 255.255.255.255 port 67 (xid=0x7fa13056)
Oct 28 09:06:16 vmfsppjb006 dhclient[1508]: DHCPACK from 168.63.129.16 (xid=0x7fa13056)
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3222] dhcp4 (eth0):   address 10.30.70.10
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3222] dhcp4 (eth0):   plen 27 (255.255.255.224)
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0):   classless static route 168.63.129.16/32 gw 10.30.70.1
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0):   classless static route 169.254.169.254/32 gw 10.30.70.1
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0):   gateway 10.30.70.1
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0):   lease time 4294967295
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0):   nameserver '168.63.129.16'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0):   domain name 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0): option broadcast_address    => '10.30.70.31'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0): option dad_wait_time        => '0'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0): option dhcp_lease_time      => '4294967295'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3223] dhcp4 (eth0): option dhcp_message_type    => '5'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option dhcp_rebinding_time  => '4294967295'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option dhcp_renewal_time    => '4294967295'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option dhcp_server_identifier => '168.63.129.16'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option domain_name          => 'bokjp34ih40u1bshlyi1iaqbra.lx.internal.cloudapp.net'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option domain_name_servers  => '168.63.129.16'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option expiry               => '5930346871'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option ip_address           => '10.30.70.10'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option network_number       => '10.30.70.0'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option next_server          => '168.63.129.16'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option private_245          => 'a8:3f:81:10'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option requested_broadcast_address => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option requested_classless_static_routes => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option requested_domain_name => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option requested_domain_name_servers => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3224] dhcp4 (eth0): option requested_domain_search => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_host_name  => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_interface_mtu => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_ms_classless_static_routes => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_nis_domain => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_nis_servers => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_ntp_servers => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_rfc3442_classless_static_routes => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_root_path  => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_routers    => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_static_routes => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_subnet_mask => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_time_offset => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3225] dhcp4 (eth0): option requested_wpad       => '1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3226] dhcp4 (eth0): option rfc3442_classless_static_routes => '0 10 30 70 1 32 168 63 129 16 10 30 70 1 32 169 254 169 254 10 30 70 1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3226] dhcp4 (eth0): option routers              => '10.30.70.1'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3226] dhcp4 (eth0): option server_name          => 'TYO221071410027'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3226] dhcp4 (eth0): option subnet_mask          => '255.255.255.224'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3226] dhcp4 (eth0): option unknown_245          => 'a8:3f:81:10'
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3226] dhcp4 (eth0): state changed unknown -> extended
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3234] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed')
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3303] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed')
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3305] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed')
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3310] manager: NetworkManager state is now CONNECTED_LOCAL
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3317] manager: NetworkManager state is now CONNECTED_SITE
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3317] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3959] device (eth0): Activation: successful, device activated.
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3964] manager: NetworkManager state is now CONNECTED_GLOBAL
Oct 28 09:06:16 vmfsppjb006 NetworkManager[1056]: <info>  [1635379576.3968] manager: startup complete
Oct 28 09:06:16 vmfsppjb006 systemd[1]: Started Network Manager Wait Online.
Oct 28 09:06:16 vmfsppjb006 systemd[1]: Starting Initial cloud-init job (metadata service crawler)...
Oct 28 09:06:16 vmfsppjb006 dhclient[1508]: Timeout too large reducing to: 2147483646 (TIME_MAX - 1)
Oct 28 09:06:16 vmfsppjb006 dhclient[1508]: bound to 10.30.70.10 -- renewal in 4294967295 seconds.
Oct 28 09:06:16 vmfsppjb006 rngd[912]: Initializing AES buffer
Oct 28 09:06:16 vmfsppjb006 rngd[912]: Enabling JITTER rng support
Oct 28 09:06:16 vmfsppjb006 rngd[912]: Initializing entropy source jitter
Oct 28 09:06:17 vmfsppjb006 systemd[1]: Started The PHP FastCGI Process Manager.
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: Cloud-init v. 19.4 running 'init' at Thu, 28 Oct 2021 00:06:18 +0000. Up 28.55 seconds.
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info++++++++++++++++++++++++++++++++++++++++
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: | Device |  Up  |           Address           |       Mask      | Scope  |     Hw-Address    |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |  eth0  | True |         10.30.70.10         | 255.255.255.224 | global | 00:22:48:68:76:f6 |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |  eth0  | True | fe80::222:48ff:fe68:76f6/64 |        .        |  link  | 00:22:48:68:76:f6 |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   lo   | True |          127.0.0.1          |    255.0.0.0    |  host  |         .         |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   lo   | True |           ::1/128           |        .        |  host  |         .         |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +--------+------+-----------------------------+-----------------+--------+-------------------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +++++++++++++++++++++++++++++++Route IPv4 info++++++++++++++++++++++++++++++++
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: | Route |   Destination   |  Gateway   |     Genmask     | Interface | Flags |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   0   |     0.0.0.0     | 10.30.70.1 |     0.0.0.0     |    eth0   |   UG  |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   1   |    10.30.70.0   |  0.0.0.0   | 255.255.255.224 |    eth0   |   U   |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   2   |  168.63.129.16  | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   3   | 169.254.169.254 | 10.30.70.1 | 255.255.255.255 |    eth0   |  UGH  |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +-------+-----------------+------------+-----------------+-----------+-------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: | Route | Destination | Gateway | Interface | Flags |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   1   |  fe80::/64  |    ::   |    eth0   |   U   |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   3   |    local    |    ::   |    eth0   |   U   |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: |   4   |   ff00::/8  |    ::   |    eth0   |   U   |
Oct 28 09:06:18 vmfsppjb006 cloud-init[1521]: ci-info: +-------+-------------+---------+-----------+-------+
Oct 28 09:06:20 vmfsppjb006 kernel: sda: sda1
Oct 28 09:06:20 vmfsppjb006 systemd[1]: Stopped File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 28 09:06:20 vmfsppjb006 systemd[1]: Starting File System Check on /dev/disk/cloud/azure_resource-part1...
Oct 28 09:06:20 vmfsppjb006 systemd-fsck[1575]: fsck.ntfs doesn't exist, not checking file system on /dev/disk/cloud/azure_resource-part1.
Oct 28 09:06:20 vmfsppjb006 systemd[1]: Started File System Check on /dev/disk/cloud/azure_resource-part1.
Oct 28 09:06:21 vmfsppjb006 chronyd[908]: Selected source 104.41.187.183
Oct 28 09:06:21 vmfsppjb006 chronyd[908]: System clock TAI offset set to 37 seconds
Oct 28 09:06:22 vmfsppjb006 kernel: EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Oct 28 09:06:22 vmfsppjb006 systemd[1]: Reloading.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started Initial cloud-init job (metadata service crawler).
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Starting Permit User Sessions...
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Reached target Network is Online.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Starting Crash recovery kernel arming...
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started Azure Linux Agent.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Starting System Logging Service...
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Starting OpenSSH server daemon...
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Reached target Cloud-config availability.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Starting Apply the settings specified in cloud-config...
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started Permit User Sessions.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started Job spooling tools.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started Command Scheduler.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started Serial Getty on ttyS0.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started Getty on tty1.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Reached target Login Prompts.
Oct 28 09:06:23 vmfsppjb006 systemd[1]: Started OpenSSH server daemon.
Oct 28 09:06:24 vmfsppjb006 rsyslogd[1696]: [origin software="rsyslogd" swVersion="8.1911.0-3.el8" x-pid="1696" x-info="https://www.rsyslog.com"] start
Oct 28 09:06:24 vmfsppjb006 systemd[1]: Started System Logging Service.
Oct 28 09:06:24 vmfsppjb006 rsyslogd[1696]: imjournal: journal files changed, reloading...  [v8.1911.0-3.el8 try https://www.rsyslog.com/e/0 ]
Oct 28 09:06:24 vmfsppjb006 cloud-init[1698]: Cloud-init v. 19.4 running 'modules:config' at Thu, 28 Oct 2021 00:06:24 +0000. Up 35.12 seconds.
Oct 28 09:06:24 vmfsppjb006 systemd[1]: Started Apply the settings specified in cloud-config.
Oct 28 09:06:24 vmfsppjb006 systemd[1]: Starting Execute cloud user/final scripts...
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.251903Z INFO Daemon Azure Linux Agent Version:2.2.46
Oct 28 09:06:25 vmfsppjb006 kdumpctl[1693]: Detected change(s) in the following file(s):
Oct 28 09:06:25 vmfsppjb006 kdumpctl[1693]:  
Oct 28 09:06:25 vmfsppjb006 kdumpctl[1693]:  /etc/fstab
Oct 28 09:06:25 vmfsppjb006 kdumpctl[1693]: Rebuilding /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.355214Z INFO Daemon OS: redhat 8.2
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.357408Z INFO Daemon Python: 3.6.8
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.359967Z INFO Daemon CGroups Status: The cgroup filesystem is ready to use
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.365060Z INFO Daemon Run daemon
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.367229Z INFO Daemon No RDMA handler exists for distro='Red Hat Enterprise Linux' version='8.2'
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.393377Z INFO Daemon cloud-init is enabled: True
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.396553Z INFO Daemon Using cloud-init for provisioning
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.400054Z INFO Daemon Clean protocol and wireserver endpoint
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.404657Z INFO Daemon Provisioning already completed, skipping.
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.407551Z INFO Daemon RDMA capabilities are not enabled, skipping
Oct 28 09:06:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:25.452899Z INFO Daemon Determined Agent WALinuxAgent-2.5.0.2 to be the latest agent
Oct 28 09:06:25 vmfsppjb006 cloud-init[1765]: Cloud-init v. 19.4 running 'modules:final' at Thu, 28 Oct 2021 00:06:25 +0000. Up 35.82 seconds.
Oct 28 09:06:25 vmfsppjb006 cloud-init[1765]: Cloud-init v. 19.4 finished at Thu, 28 Oct 2021 00:06:25 +0000. Datasource DataSourceAzure [seed=/dev/sr0].  Up 35.98 seconds
Oct 28 09:06:25 vmfsppjb006 echo[1836]: trying to reload or restart NetworkManager.service
Oct 28 09:06:25 vmfsppjb006 systemd[1]: Reloading Network Manager.
Oct 28 09:06:25 vmfsppjb006 NetworkManager[1056]: <info>  [1635379585.6236] audit: op="reload" arg="0" pid=1860 uid=0 result="success"
Oct 28 09:06:25 vmfsppjb006 NetworkManager[1056]: <info>  [1635379585.6241] config: signal: SIGHUP (no changes from disk)
Oct 28 09:06:26 vmfsppjb006 systemd[1]: Reloaded Network Manager.
Oct 28 09:06:26 vmfsppjb006 systemd[1]: Started Execute cloud user/final scripts.
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.596231Z INFO ExtHandler ExtHandler The agent will now check for updates and then will process extensions. Output to /dev/console will be suspended during those operations.
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.674391Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.5.0.2 is running as the goal state agent
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.674581Z INFO ExtHandler ExtHandler Detect protocol endpoint
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.674650Z INFO ExtHandler ExtHandler Clean protocol and wireserver endpoint
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.674730Z INFO ExtHandler ExtHandler WireServer endpoint is not found. Rerun dhcp handler
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.674783Z INFO ExtHandler ExtHandler Test for route to 168.63.129.16
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.674997Z INFO ExtHandler ExtHandler Route to 168.63.129.16 exists
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.675061Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.746174Z INFO ExtHandler ExtHandler Fabric preferred wire protocol version:2015-04-05
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.746502Z INFO ExtHandler ExtHandler Wire protocol version:2012-11-30
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.746584Z INFO ExtHandler ExtHandler Server preferred version:2015-04-05
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.793159Z INFO ExtHandler ExtHandler Initializing goal state during protocol detection
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.798367Z INFO ExtHandler ExtHandler Fetching new goal state [incarnation 1 (force update)]
Oct 28 09:06:26 vmfsppjb006 dracut[2067]: dracut-049-70.git20200228.el8
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.864803Z INFO ExtHandler ExtHandler Found private key matching thumbprint FDB109232A4753434A77D650E7CDF46CB48C75E6
Oct 28 09:06:26 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:26.878065Z INFO ExtHandler ExtHandler Fetch goal state completed
Oct 28 09:06:27 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:27.012833Z INFO ExtHandler ExtHandler Distro: redhat-8.2; OSUtil: RedhatOSUtil; AgentService: waagent; Python: 3.6.8; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.14.0;
Oct 28 09:06:27 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:27.016626Z INFO ExtHandler ExtHandler WALinuxAgent-2.5.0.2 running as process 1827
Oct 28 09:06:27 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:27.019132Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['redhat', '8.2', 'Ootpa', 'Red Hat Enterprise Linux']
Oct 28 09:06:27 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:27.021717Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct 28 09:06:27 vmfsppjb006 dracut[2072]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o "plymouth dash resume ifcfg earlykdump" --mount "/dev/mapper/rootvg-varlv /kdumproot//var xfs defaults,noauto" --no-hostonly-default-device -f /boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img 4.18.0-193.47.1.el8_2.x86_64
Oct 28 09:06:27 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:27.418866Z INFO ExtHandler ExtHandler Firewalld.service present on the VM, setting up permanent rules on the VM
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.126502Z INFO ExtHandler ExtHandler Firewall rules already set. No change needed.
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.127210Z INFO ExtHandler ExtHandler Persistent firewall rules setup successfully
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.127981Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True]
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.131102Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.131208Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.131504Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.131928Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: Iface#011Destination#011Gateway #011Flags#011RefCnt#011Use#011Metric#011Mask#011#011MTU#011Window#011IRTT
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: eth0#01100000000#01101461E0A#0110003#0110#0110#011100#01100000000#0110#0110#0110
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: eth0#01100461E0A#01100000000#0110001#0110#0110#011100#011E0FFFFFF#0110#0110#0110
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: eth0#01110813FA8#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: eth0#011FEA9FEA9#01101461E0A#0110007#0110#0110#011100#011FFFFFFFF#0110#0110#0110
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.133014Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.138570Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.138860Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.139230Z INFO EnvHandler ExtHandler Configure routes
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.139317Z INFO EnvHandler ExtHandler Gateway:None
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.139375Z INFO EnvHandler ExtHandler Routes:None
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.139758Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.144724Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.145284Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.147817Z INFO MonitorHandler ExtHandler Network interfaces:
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: Executing ['ip', '-a', '-o', 'link']:
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:68:76:f6 brd ff:ff:ff:ff:ff:ff
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2: eth0    inet 10.30.70.10/27 brd 10.30.70.31 scope global noprefixroute eth0\       valid_lft forever preferred_lft forever
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2: eth0    inet6 fe80::222:48ff:fe68:76f6/64 scope link \       valid_lft forever preferred_lft forever
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.150734Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.151159Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.153653Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.158032Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.247341Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState started [Incarnation: 1; Activity Id: f098e658-8b4b-4213-aabb-5b9450bb4a3b; Correlation Id: 0cd4dff9-6f45-4323-a6a2-da07b5aac8c0; GS Creation Time: 2021-10-28T00:05:28.443367Z]
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.247899Z INFO ExtHandler ExtHandler No extension/run-time settings settings found for Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.292710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Target handler state: enabled [incarnation 1]
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.295281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] [Enable] current handler state is: enabled
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.295428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Update settings file: 0.settings
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.295721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Requested extension state: enabled
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.302054Z INFO EnvHandler ExtHandler Set block dev timeout: sdb with timeout: 300
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.302224Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.302630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Enable extension: [./install.sh enable]
Oct 28 09:06:28 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:28.303033Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.1974.1", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 28 09:06:28 vmfsppjb006 dracut[2072]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 28 09:06:28 vmfsppjb006 dracut[2072]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 28 09:06:28 vmfsppjb006 dracut[2072]: dracut module 'ifcfg' will not be installed, because it's in the list to be omitted!
Oct 28 09:06:28 vmfsppjb006 dracut[2072]: dracut module 'plymouth' will not be installed, because it's in the list to be omitted!
Oct 28 09:06:28 vmfsppjb006 dracut[2072]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 28 09:06:28 vmfsppjb006 dracut[2072]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'resume' will not be installed, because it's in the list to be omitted!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'earlykdump' will not be installed, because it's in the list to be omitted!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found!
Oct 28 09:06:29 vmfsppjb006 dracut[2072]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found!
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: dracut module 'stratis' will not be installed, because command 'stratisd-init' could not be found!
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found!
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found!
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found!
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found!
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: 95nfs: Could not find any command of 'rpcbind portmap'!
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: *** Including module: bash ***
Oct 28 09:06:30 vmfsppjb006 dracut[2072]: *** Including module: systemd ***
Oct 28 09:06:31 vmfsppjb006 dracut[2072]: *** Including module: systemd-initrd ***
Oct 28 09:06:31 vmfsppjb006 dracut[2072]: *** Including module: nss-softokn ***
Oct 28 09:06:31 vmfsppjb006 dracut[2072]: *** Including module: rngd ***
Oct 28 09:06:31 vmfsppjb006 dracut[2072]: *** Including module: i18n ***
Oct 28 09:06:33 vmfsppjb006 dracut[2072]: *** Including module: drm ***
Oct 28 09:06:33 vmfsppjb006 dracut[2072]: *** Including module: prefixdevname ***
Oct 28 09:06:33 vmfsppjb006 dracut[2072]: *** Including module: dm ***
Oct 28 09:06:33 vmfsppjb006 dracut[2072]: Skipping udev rule: 64-device-mapper.rules
Oct 28 09:06:33 vmfsppjb006 dracut[2072]: Skipping udev rule: 60-persistent-storage-dm.rules
Oct 28 09:06:33 vmfsppjb006 dracut[2072]: Skipping udev rule: 55-dm.rules
Oct 28 09:06:33 vmfsppjb006 dracut[2072]: *** Including module: kernel-modules ***
Oct 28 09:06:34 vmfsppjb006 dracut[2072]: *** Including module: kernel-modules-extra ***
Oct 28 09:06:34 vmfsppjb006 dracut[2072]: *** Including module: lvm ***
Oct 28 09:06:34 vmfsppjb006 dracut[2072]: Skipping udev rule: 64-device-mapper.rules
Oct 28 09:06:34 vmfsppjb006 dracut[2072]: Skipping udev rule: 56-lvm.rules
Oct 28 09:06:34 vmfsppjb006 dracut[2072]: Skipping udev rule: 60-persistent-storage-lvm.rules
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: fstab-sys ***
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: rootfs-block ***
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: terminfo ***
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: udev-rules ***
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: Skipping udev rule: 91-permissions.rules
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: Skipping udev rule: 80-drivers-modprobe.rules
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: dracut-systemd ***
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: usrmount ***
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: base ***
Oct 28 09:06:35 vmfsppjb006 dracut[2072]: *** Including module: fs-lib ***
Oct 28 09:06:36 vmfsppjb006 dracut[2072]: *** Including module: kdumpbase ***
Oct 28 09:06:36 vmfsppjb006 dracut[2072]: *** Including module: microcode_ctl-fw_dir_override ***
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:  microcode_ctl module: mangling fw_dir
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware"
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel"...
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:      microcode_ctl: intel: caveats check for kernel version "4.18.0-193.47.1.el8_2.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel" to fw_dir variable
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"...
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: configuration "intel-06-2d-07" is ignored
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"...
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: configuration "intel-06-4e-03" is ignored
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"...
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: configuration "intel-06-4f-01" is ignored
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"...
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: configuration "intel-06-55-04" is ignored
Oct 28 09:06:36 vmfsppjb006 dracut[2072]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"...
Oct 28 09:06:37 vmfsppjb006 dracut[2072]:    microcode_ctl: configuration "intel-06-5e-03" is ignored
Oct 28 09:06:37 vmfsppjb006 dracut[2072]:    microcode_ctl: processing data directory  "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"...
Oct 28 09:06:37 vmfsppjb006 dracut[2072]:    microcode_ctl: configuration "intel-06-8c-01" is ignored
Oct 28 09:06:37 vmfsppjb006 dracut[2072]:    microcode_ctl: final fw_dir: "/usr/share/microcode_ctl/ucode_with_caveats/intel /lib/firmware/updates /lib/firmware"
Oct 28 09:06:37 vmfsppjb006 dracut[2072]: *** Including module: shutdown ***
Oct 28 09:06:37 vmfsppjb006 dracut[2072]: *** Including module: squash ***
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:37.328809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.1974.1] Command: ./install.sh enable
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: [stdout]
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: Checking if system is supported
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: This system is supported
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: Enabling Azure Network Watcher Agent
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: Force kill all NetworkWatcher Agent related processes
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: Linux version 4.18.0-193.47.1.el8_2.x86_64 (mockbuild@x86-vm-07.build.eng.bos.redhat.com) (gcc version 8.3.1 20191121 (Red Hat 8.3.1-5) (GCC)) #1 SMP Thu Mar 4 03:03:32 EST 2021
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: Setting up Red Hat environment for SSL handshakes
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: Starting AzureNetworkWatcherAgent...Started[0]
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: Core limit: 0
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: [stderr]
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    echo "Disabling Azure Network Watcher Agent"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    forceKillOldAgent
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: }
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: uninstall()
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: {
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    echo "Uninstalling Azure Network Watcher Agent"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    forceKillOldAgent
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: }
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: install()
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: {
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    echo "Installing Azure Network Watcher Agent"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    forceKillOldAgent
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    continueOnUpdateFailureConfigured
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    if [ $? -eq 1 ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        if [ $? -eq 1 ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:            echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:            uninstall
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        fi
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    fi
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: }
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: update()
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: {
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    echo "Updating Azure Network Watcher Agent"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    continueOnUpdateFailureConfigured
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    if [ $? -eq 1 ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        if [ $? -eq 1 ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:            echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:            disable
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        fi
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    fi
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    install
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: }
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: enable()
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: {
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    echo "Enabling Azure Network Watcher Agent"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    forceKillOldAgent
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    /etc/init.d/AzureNetworkWatcherAgent start
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # after agent start the process controller forks child process that
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # initializing the environmet writing X.status file in
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # /var/lib/waagent/NWA folder. Unfortunately until environment is received
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # the status file could not be created since environment contains all the
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # informaton about destination folder, seq id etc. If X.status file is not
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # there waagent caused a failure that is shown in UI as deployment problem
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # even though agent is running successfully. In order to avoid the UI
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # failure the simple thing for now is to wait for a bit until fork is done,
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # later when waagent has better logic to handle a status it should be
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    # removed.
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    sleep 7s
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: }
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: GLIBC_MINVERSION="2.11"
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: + GLIBC_MINVERSION=2.11
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: GLIBC_MINVERSION_MAJOR=2
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: + GLIBC_MINVERSION_MAJOR=2
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: GLIBC_MINVERSION_MINOR=11
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: + GLIBC_MINVERSION_MINOR=11
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: is_version_supported()
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: {
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    curversion=$1
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    if [ "$curversion" = "$GLIBC_MINVERSION" ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        return 1
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    fi
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    local hasdot=0
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    local delim=.
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    case $curversion in
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        *$delim*) hasdot=1;;
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        *) hasdot=0;;
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    esac
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:    if [ $hasdot -eq 1 ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        firstval=`echo $curversion | cut -d "." -f 1`
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:            return 1
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:            return 0
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]:        e
Oct 28 09:06:37 vmfsppjb006 dracut[2072]: *** Including modules done ***
Oct 28 09:06:37 vmfsppjb006 dracut[2072]: *** Installing kernel module dependencies ***
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:37.506966Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Target handler state: enabled [incarnation 1]
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:37.513420Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] [Enable] current handler state is: enabled
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:37.513568Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Extension has no settings, write empty 0.settings
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:37.514066Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Enable extension: [scripts/run_python.sh scripts/enableHandler.py 1>&2]
Oct 28 09:06:37 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:37.514412Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Executing command: /var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500/scripts/run_python.sh scripts/enableHandler.py 1>&2 with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "9.10.11.17500", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 28 09:06:37 vmfsppjb006 dracut[2072]: *** Installing kernel module dependencies done ***
Oct 28 09:06:38 vmfsppjb006 dracut[2072]: *** Resolving executable dependencies ***
Oct 28 09:06:38 vmfsppjb006 kernel: bluechannel: loading out-of-tree module taints kernel.
Oct 28 09:06:38 vmfsppjb006 kernel: bluechannel: module license 'Proprietary' taints kernel.
Oct 28 09:06:38 vmfsppjb006 kernel: Disabling lock debugging due to kernel taint
Oct 28 09:06:38 vmfsppjb006 kernel: bluechannel: module verification failed: signature and/or required key missing - tainting kernel
Oct 28 09:06:38 vmfsppjb006 kernel: bluechannel: driver loading ver=9.10.11 rev=17500
Oct 28 09:06:39 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:39.586070Z INFO ExtHandler [Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux-9.10.11.17500] Command: scripts/run_python.sh scripts/enableHandler.py 1>&2
Oct 28 09:06:39 vmfsppjb006 python3.6[1694]: [stdout]
Oct 28 09:06:39 vmfsppjb006 python3.6[1694]: [stderr]
Oct 28 09:06:39 vmfsppjb006 python3.6[1694]: Microsoft Dependency Agent service started.
Oct 28 09:06:39 vmfsppjb006 kernel: msda: driver loading ver=9.10.11 rev=17500
Oct 28 09:06:39 vmfsppjb006 kernel: msda: ipv6 support is active
Oct 28 09:06:39 vmfsppjb006 kernel: msda: bluechannel_link @0000000064d23738
Oct 28 09:06:39 vmfsppjb006 kernel: msda: bluechannel_broadcast_heartbeat @00000000745887d8
Oct 28 09:06:39 vmfsppjb006 kernel: sock_create v4 socket
Oct 28 09:06:39 vmfsppjb006 kernel: Supertramp allocated at 0000000084df91bc
Oct 28 09:06:39 vmfsppjb006 kernel: msda: device registered at 10.56
Oct 28 09:06:40 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:39.966752Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Target handler state: enabled [incarnation 1]
Oct 28 09:06:40 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:40.022758Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] [Enable] current handler state is: enabled
Oct 28 09:06:40 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:40.022907Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Update settings file: 0.settings
Oct 28 09:06:40 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:40.023206Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Requested extension state: enabled
Oct 28 09:06:40 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:40.023905Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable extension: [omsagent_shim.sh -enable]
Oct 28 09:06:40 vmfsppjb006 python3.6[1694]: 2021-10-28T00:06:40.024278Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Executing command: /var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40/omsagent_shim.sh -enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.13.40", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Key\": \"ExtensionTelemetryPipeline\", \"Value\": \"1.0\"}]"}
Oct 28 09:06:40 vmfsppjb006 kernel: msda: set_shm_size=0x800000
Oct 28 09:06:40 vmfsppjb006 kernel: msda: attaching hooks
Oct 28 09:06:40 vmfsppjb006 kernel: shm_area: initialized
Oct 28 09:06:40 vmfsppjb006 kernel: msda: invoking bluechannel_link: LINK {handle_bluechannel_event=0000000065d09fa9}
Oct 28 09:06:40 vmfsppjb006 kernel: bluechannel: transition to LINKED
Oct 28 09:06:40 vmfsppjb006 kernel: msda: starting extants
Oct 28 09:06:40 vmfsppjb006 kernel: msda: extants complete
Oct 28 09:06:40 vmfsppjb006 kernel: msda: mmap requested size=8388608 area_size=8388608
Oct 28 09:06:41 vmfsppjb006 dracut[2072]: *** Resolving executable dependencies done***
Oct 28 09:06:44 vmfsppjb006 dracut[2072]: *** Hardlinking files ***
Oct 28 09:06:45 vmfsppjb006 dracut[2072]: *** Hardlinking files done ***
Oct 28 09:06:45 vmfsppjb006 dracut[2072]: *** Stripping files ***
Oct 28 09:06:47 vmfsppjb006 dracut[2072]: *** Stripping files done ***
Oct 28 09:06:47 vmfsppjb006 dracut[2072]: *** Generating early-microcode cpio image ***
Oct 28 09:06:47 vmfsppjb006 dracut[2072]: *** Constructing GenuineIntel.bin ****
Oct 28 09:06:47 vmfsppjb006 dracut[2072]: *** Store current command line parameters ***
Oct 28 09:06:47 vmfsppjb006 dracut[2072]: Stored kernel commandline:
Oct 28 09:06:47 vmfsppjb006 dracut[2072]: rd.lvm.lv=rootvg/varlv
Oct 28 09:06:47 vmfsppjb006 dracut[2072]: *** Creating image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' ***
Oct 28 09:06:51 vmfsppjb006 systemd[1]: Started MySQL Server.
Oct 28 09:06:51 vmfsppjb006 systemd[1]: Starting Zabbix Server...
Oct 28 09:06:51 vmfsppjb006 systemd[1]: Starting Jobarranger Monitor...
Oct 28 09:06:51 vmfsppjb006 systemd[1]: Starting Jobarranger Server...
Oct 28 09:06:52 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 09:06:53 vmfsppjb006 systemd[1]: jobarg-server.service: Can't open PID file /run/jobarranger/jobarg_server.pid (yet?) after start: No such file or directory
Oct 28 09:06:53 vmfsppjb006 systemd[1]: jobarg-monitor.service: Can't open PID file /run/jobarranger/jobarg_monitor.pid (yet?) after start: No such file or directory
Oct 28 09:06:53 vmfsppjb006 systemd[1]: Started Jobarranger Server.
Oct 28 09:06:53 vmfsppjb006 journal[6353]: Job Arranger Server[6353]: [JASERVER000001] Starting Job Arranger Server. Job Arranger 5.0.1 (revision 7557).
Oct 28 09:06:53 vmfsppjb006 journal[6353]: Job Arranger Server[6353]: [JASERVER000003] server #0 started [main process]
Oct 28 09:06:53 vmfsppjb006 journal[6361]: Job Arranger Server[6361]: [JASERVER000004] server #6 started [job trapper #3]
Oct 28 09:06:53 vmfsppjb006 journal[6363]: Job Arranger Server[6363]: [JASERVER000004] server #8 started [job trapper #5]
Oct 28 09:06:53 vmfsppjb006 journal[6364]: Job Arranger Server[6364]: [JASERVER000004] server #9 started [job loader #1]
Oct 28 09:06:53 vmfsppjb006 journal[6366]: Job Arranger Server[6366]: [JASERVER000004] server #11 started [message send #1]
Oct 28 09:06:53 vmfsppjb006 journal[6362]: Job Arranger Server[6362]: [JASERVER000004] server #7 started [job trapper #4]
Oct 28 09:06:53 vmfsppjb006 journal[6359]: Job Arranger Server[6359]: [JASERVER000004] server #4 started [job trapper #1]
Oct 28 09:06:53 vmfsppjb006 journal[6355]: Job Arranger Monitor[6355]: Starting Job Arranger monitor. Job Arranger 5.0.1 (revision 7557).
Oct 28 09:06:53 vmfsppjb006 journal[6356]: Job Arranger Server[6356]: [JASERVER000004] server #1 started [start and check the jobnet #1]
Oct 28 09:06:53 vmfsppjb006 systemd[1]: Started Jobarranger Monitor.
Oct 28 09:06:53 vmfsppjb006 journal[6357]: Job Arranger Server[6357]: [JASERVER000004] server #2 started [start the job #1]
Oct 28 09:06:53 vmfsppjb006 journal[6358]: Job Arranger Server[6358]: [JASERVER000004] server #3 started [check the running job #1]
Oct 28 09:06:53 vmfsppjb006 journal[6360]: Job Arranger Server[6360]: [JASERVER000004] server #5 started [job trapper #2]
Oct 28 09:06:53 vmfsppjb006 journal[6365]: Job Arranger Server[6365]: [JASERVER000004] server #10 started [jobnet boot #1]
Oct 28 09:06:53 vmfsppjb006 journal[6367]: Job Arranger Server[6367]: [JASERVER000004] server #12 started [self-monitoring #1]
Oct 28 09:06:53 vmfsppjb006 journal[6370]: Job Arranger Monitor[6370]: jobarg_monitor #0 started [monitor]
Oct 28 09:06:53 vmfsppjb006 systemd[1]: zabbix-server.service: Can't open PID file /run/zabbix/zabbix_server.pid (yet?) after start: No such file or directory
Oct 28 09:06:53 vmfsppjb006 systemd[1]: Started Zabbix Server.
Oct 28 09:06:54 vmfsppjb006 kernel: hv_balloon: Max. dynamic memory size: 2048 MB
Oct 28 09:06:56 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:06:56 vmfsppjb006 dbus-daemon[6387]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:07:02 vmfsppjb006 systemd[1]: omsagent-cc053e05-5f05-452e-af0d-b80449098844.service: State 'stop-sigterm' timed out. Killing.
Oct 28 09:07:02 vmfsppjb006 systemd[1]: omsagent-cc053e05-5f05-452e-af0d-b80449098844.service: Killing process 1581 (omsagent) with signal SIGKILL.
Oct 28 09:07:02 vmfsppjb006 systemd[1]: omsagent-cc053e05-5f05-452e-af0d-b80449098844.service: Main process exited, code=killed, status=9/KILL
Oct 28 09:07:02 vmfsppjb006 systemd[1]: omsagent-cc053e05-5f05-452e-af0d-b80449098844.service: Failed with result 'timeout'.
Oct 28 09:07:02 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 09:07:02 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 09:07:02 vmfsppjb006 systemd[1]: Reached target Multi-User System.
Oct 28 09:07:02 vmfsppjb006 systemd[1]: Starting Azure temporary resource disk dataloss warning file creation...
Oct 28 09:07:02 vmfsppjb006 systemd[1]: Starting Update UTMP about System Runlevel Changes...
Oct 28 09:07:02 vmfsppjb006 systemd[1]: Reached target Cloud-init target.
Oct 28 09:07:02 vmfsppjb006 systemd[1]: Started Update UTMP about System Runlevel Changes.
Oct 28 09:07:03 vmfsppjb006 temp-disk-dataloss-warning[6418]: Creating a dataloss warning file at /mnt/DATALOSS_WARNING_README.txt
Oct 28 09:07:03 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:07:03 vmfsppjb006 systemd[1]: Started Azure temporary resource disk dataloss warning file creation.
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: 2021-10-28T00:07:07.128882Z INFO ExtHandler [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Command: omsagent_shim.sh -enable
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: [stdout]
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: 2021/10/28 09:07:05 [Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux-1.13.40] Enable,success,0,Enable succeeded
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: [stderr]
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: 2021-10-28T00:07:07.132201Z INFO ExtHandler ExtHandler ProcessExtensionsInGoalState completed [Incarnation: 1; 38884 ms; Activity Id: f098e658-8b4b-4213-aabb-5b9450bb4a3b; Correlation Id: 0cd4dff9-6f45-4323-a6a2-da07b5aac8c0; GS Creation Time: 2021-10-28T00:05:28.443367Z]
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: 2021-10-28T00:07:07.268483Z INFO ExtHandler ExtHandler Extension status: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: 2021-10-28T00:07:07.269000Z INFO ExtHandler ExtHandler All extensions in the goal state have reached a terminal state: [('Microsoft.Azure.Monitoring.DependencyAgent.DependencyAgentLinux', 'Ready'), ('Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux', 'success'), ('Microsoft.EnterpriseCloud.Monitoring.OmsAgentForLinux', 'success')]
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: 2021-10-28T00:07:07.269369Z INFO ExtHandler ExtHandler Looking for existing remote access users.
Oct 28 09:07:07 vmfsppjb006 sssd[nss][936]: Enumeration requested but not enabled
Oct 28 09:07:07 vmfsppjb006 python3.6[1694]: 2021-10-28T00:07:07.391602Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 09:07:07 vmfsppjb006 dracut[2072]: *** Creating initramfs image file '/boot/initramfs-4.18.0-193.47.1.el8_2.x86_64kdump.img' done ***
Oct 28 09:07:07 vmfsppjb006 setroubleshoot[6387]: SELinux is preventing zabbix_server from using the dac_override capability. For complete SELinux messages run: sealert -l a6656240-7d68-4406-88d9-8f8364246780
Oct 28 09:07:09 vmfsppjb006 platform-python[6387]: SELinux is preventing zabbix_server from using the dac_override capability.#012#012*****  Plugin dac_override (91.4 confidence) suggests   **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012*****  Plugin catchall (9.59 confidence) suggests   **************************#012#012If you believe that zabbix_server should have the dac_override capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:07:09 vmfsppjb006 kdumpctl[1693]: kexec: loaded kdump kernel
Oct 28 09:07:09 vmfsppjb006 kdumpctl[1693]: Starting kdump: [OK]
Oct 28 09:07:09 vmfsppjb006 systemd[1]: Started Crash recovery kernel arming.
Oct 28 09:07:09 vmfsppjb006 systemd[1]: Startup finished in 1.305s (kernel) + 10.921s (initrd) + 1min 8.229s (userspace) = 1min 20.455s.
Oct 28 09:07:09 vmfsppjb006 setroubleshoot[6387]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:07:10 vmfsppjb006 setroubleshoot[6387]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:07:10 vmfsppjb006 platform-python[6387]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 09:09:01 vmfsppjb006 systemd[1]: Created slice system-user\x2druntime\x2ddir.slice.
Oct 28 09:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 09:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 09:09:01 vmfsppjb006 systemd[1]: Started Session 1 of user omsagent.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Reached target Timers.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Starting D-Bus User Message Bus Socket.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Reached target Paths.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Listening on D-Bus User Message Bus Socket.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Reached target Sockets.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Reached target Basic System.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Reached target Default.
Oct 28 09:09:02 vmfsppjb006 systemd[6795]: Startup finished in 149ms.
Oct 28 09:09:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 09:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:09:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Stopped target Default.
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Stopped target Basic System.
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Stopped target Sockets.
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Closed D-Bus User Message Bus Socket.
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Stopped target Timers.
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Stopped target Paths.
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Reached target Shutdown.
Oct 28 09:09:03 vmfsppjb006 systemd[6795]: Starting Exit the Session...
Oct 28 09:09:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 6840 (systemctl) with signal SIGKILL.
Oct 28 09:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:09:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 09:09:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:09:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 09:09:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 09:09:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 09:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:09:37 vmfsppjb006 dbus-daemon[6886]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:09:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:09:38 vmfsppjb006 setroubleshoot[6886]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:09:39 vmfsppjb006 setroubleshoot[6886]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:09:39 vmfsppjb006 platform-python[6886]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:10:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:10:37 vmfsppjb006 dbus-daemon[6952]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:10:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:10:38 vmfsppjb006 setroubleshoot[6952]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:10:39 vmfsppjb006 setroubleshoot[6952]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:10:39 vmfsppjb006 platform-python[6952]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:15:55 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 28 09:16:00 vmfsppjb006 dnf[7254]: packages-microsoft-com-prod                      13 kB/s | 3.0 kB     00:00
Oct 28 09:16:00 vmfsppjb006 dnf[7254]: MySQL 8.0 Community Server                      136 kB/s | 2.6 kB     00:00
Oct 28 09:16:00 vmfsppjb006 dnf[7254]: MySQL Connectors Community                       61 kB/s | 2.6 kB     00:00
Oct 28 09:16:00 vmfsppjb006 dnf[7254]: MySQL Tools Community                            69 kB/s | 2.6 kB     00:00
Oct 28 09:16:01 vmfsppjb006 dnf[7254]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.3 kB/s | 2.4 kB     00:00
Oct 28 09:16:04 vmfsppjb006 dnf[7254]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.8 kB/s | 2.8 kB     00:00
Oct 28 09:16:06 vmfsppjb006 dnf[7254]: Microsoft Azure RPMs for RHEL8 Extended Update  6.5 kB/s | 2.1 kB     00:00
Oct 28 09:16:06 vmfsppjb006 dnf[7254]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 28 09:16:06 vmfsppjb006 dnf[7254]: Zabbix Official Repository non-supported - x86_  13 kB/s | 3.0 kB     00:00
Oct 28 09:16:08 vmfsppjb006 dnf[7254]: Metadata cache created.
Oct 28 09:16:08 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 28 09:16:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:16:37 vmfsppjb006 dbus-daemon[7303]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:16:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:16:37 vmfsppjb006 setroubleshoot[7303]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:16:38 vmfsppjb006 setroubleshoot[7303]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:16:38 vmfsppjb006 platform-python[7303]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:17:36 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1000.
Oct 28 09:17:36 vmfsppjb006 systemd[1]: Started /run/user/1000 mount wrapper.
Oct 28 09:17:36 vmfsppjb006 systemd[1]: Starting User Manager for UID 1000...
Oct 28 09:17:36 vmfsppjb006 systemd[1]: Started Session 3 of user finsrvpf.
Oct 28 09:17:36 vmfsppjb006 systemd-logind[943]: New session 3 of user finsrvpf.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Starting D-Bus User Message Bus Socket.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Reached target Timers.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Reached target Paths.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Listening on D-Bus User Message Bus Socket.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Reached target Sockets.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Reached target Basic System.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Reached target Default.
Oct 28 09:17:37 vmfsppjb006 systemd[7377]: Startup finished in 54ms.
Oct 28 09:17:37 vmfsppjb006 systemd[1]: Started User Manager for UID 1000.
Oct 28 09:17:43 vmfsppjb006 su[7415]: (to root) finsrvpf on pts/0
Oct 28 09:18:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:18:37 vmfsppjb006 dbus-daemon[7513]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:18:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:18:37 vmfsppjb006 setroubleshoot[7513]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:18:38 vmfsppjb006 setroubleshoot[7513]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:18:38 vmfsppjb006 platform-python[7513]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:20:15 vmfsppjb006 systemd[7377]: Starting Mark boot as successful...
Oct 28 09:20:15 vmfsppjb006 systemd[7377]: Started Mark boot as successful.
Oct 28 09:20:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:20:37 vmfsppjb006 dbus-daemon[7641]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:20:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:20:37 vmfsppjb006 setroubleshoot[7641]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:20:38 vmfsppjb006 setroubleshoot[7641]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:20:38 vmfsppjb006 platform-python[7641]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:20:55 vmfsppjb006 systemd[1]: Starting Cleanup of Temporary Directories...
Oct 28 09:20:55 vmfsppjb006 systemd-tmpfiles[7663]: [/usr/lib/tmpfiles.d/mysql.conf:23] Line references path below legacy directory /var/run/, updating /var/run/mysqld → /run/mysqld; please update the tmpfiles.d/ drop-in file accordingly.
Oct 28 09:20:55 vmfsppjb006 systemd-tmpfiles[7663]: [/usr/lib/tmpfiles.d/subscription-manager.conf:1] Line references path below legacy directory /var/run/, updating /var/run/rhsm → /run/rhsm; please update the tmpfiles.d/ drop-in file accordingly.
Oct 28 09:20:55 vmfsppjb006 systemd[1]: Started Cleanup of Temporary Directories.
Oct 28 09:21:25 vmfsppjb006 python3.6[1694]: 2021-10-28T00:21:25.603115Z INFO Daemon Agent WALinuxAgent-2.5.0.2 launched with command '/usr/bin/python3.6 -u bin/WALinuxAgent-2.5.0.2-py2.7.egg -run-exthandlers' is successfully running
Oct 28 09:21:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:21:37 vmfsppjb006 dbus-daemon[7715]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:21:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:21:37 vmfsppjb006 setroubleshoot[7715]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:21:38 vmfsppjb006 setroubleshoot[7715]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:21:38 vmfsppjb006 platform-python[7715]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 09:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 09:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 09:24:01 vmfsppjb006 systemd[1]: Started Session 5 of user omsagent.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Reached target Paths.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Reached target Timers.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Starting D-Bus User Message Bus Socket.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Listening on D-Bus User Message Bus Socket.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Reached target Sockets.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Reached target Basic System.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Reached target Default.
Oct 28 09:24:01 vmfsppjb006 systemd[7855]: Startup finished in 45ms.
Oct 28 09:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 09:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Stopped target Default.
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Stopped target Basic System.
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Stopped target Timers.
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Stopped target Paths.
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Stopped target Sockets.
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Closed D-Bus User Message Bus Socket.
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Reached target Shutdown.
Oct 28 09:24:02 vmfsppjb006 systemd[7855]: Starting Exit the Session...
Oct 28 09:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 7897 (systemctl) with signal SIGKILL.
Oct 28 09:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 09:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 09:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 09:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 09:24:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:24:37 vmfsppjb006 dbus-daemon[7940]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:24:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:24:37 vmfsppjb006 setroubleshoot[7940]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:24:38 vmfsppjb006 setroubleshoot[7940]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:24:38 vmfsppjb006 platform-python[7940]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:31:10 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 09:31:11 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 09:31:11 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 09:33:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:33:37 vmfsppjb006 dbus-daemon[8554]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:33:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:33:38 vmfsppjb006 setroubleshoot[8554]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:33:38 vmfsppjb006 setroubleshoot[8554]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:33:38 vmfsppjb006 platform-python[8554]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:37:10 vmfsppjb006 python3.6[1694]: 2021-10-28T00:37:10.831685Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 1;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Started Session 7 of user omsagent.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Reached target Timers.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Starting D-Bus User Message Bus Socket.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Reached target Paths.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Listening on D-Bus User Message Bus Socket.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Reached target Sockets.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Reached target Basic System.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Reached target Default.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Startup finished in 47ms.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Stopped target Default.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Stopped target Basic System.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Stopped target Timers.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Stopped target Paths.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Stopped target Sockets.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Closed D-Bus User Message Bus Socket.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Reached target Shutdown.
Oct 28 09:39:01 vmfsppjb006 systemd[8861]: Starting Exit the Session...
Oct 28 09:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 8904 (systemctl) with signal SIGKILL.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 09:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 09:39:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:39:37 vmfsppjb006 dbus-daemon[8946]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:39:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:39:38 vmfsppjb006 setroubleshoot[8946]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:39:38 vmfsppjb006 setroubleshoot[8946]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:39:38 vmfsppjb006 platform-python[8946]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:51:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:51:37 vmfsppjb006 dbus-daemon[9624]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:51:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:51:38 vmfsppjb006 setroubleshoot[9624]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:51:38 vmfsppjb006 setroubleshoot[9624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:51:38 vmfsppjb006 platform-python[9624]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:53:18 vmfsppjb006 systemd[1]: Started Session 9 of user finsrvpf.
Oct 28 09:53:18 vmfsppjb006 systemd-logind[943]: New session 9 of user finsrvpf.
Oct 28 09:53:30 vmfsppjb006 su[9764]: (to jobuser) finsrvpf on pts/1
Oct 28 09:53:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:53:37 vmfsppjb006 dbus-daemon[9797]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:53:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:53:38 vmfsppjb006 setroubleshoot[9797]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:53:39 vmfsppjb006 setroubleshoot[9797]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:53:39 vmfsppjb006 platform-python[9797]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:53:47 vmfsppjb006 systemd[1]: Started Session 10 of user finsrvpf.
Oct 28 09:53:47 vmfsppjb006 systemd-logind[943]: New session 10 of user finsrvpf.
Oct 28 09:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 09:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 09:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 09:54:01 vmfsppjb006 systemd[1]: Started Session 11 of user omsagent.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Starting D-Bus User Message Bus Socket.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Reached target Timers.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Reached target Paths.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Listening on D-Bus User Message Bus Socket.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Reached target Sockets.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Reached target Basic System.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Reached target Default.
Oct 28 09:54:01 vmfsppjb006 systemd[9866]: Startup finished in 47ms.
Oct 28 09:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 09:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Stopped target Default.
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Stopped target Basic System.
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Stopped target Sockets.
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Stopped target Timers.
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Stopped target Paths.
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Closed D-Bus User Message Bus Socket.
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Reached target Shutdown.
Oct 28 09:54:02 vmfsppjb006 systemd[9866]: Starting Exit the Session...
Oct 28 09:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 9908 (systemctl) with signal SIGKILL.
Oct 28 09:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 09:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 09:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 09:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 09:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 09:54:05 vmfsppjb006 su[9859]: (to root) finsrvpf on pts/2
Oct 28 09:54:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:54:37 vmfsppjb006 dbus-daemon[9974]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:54:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:54:38 vmfsppjb006 setroubleshoot[9974]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:54:38 vmfsppjb006 setroubleshoot[9974]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:54:39 vmfsppjb006 platform-python[9974]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:55:12 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 09:55:13 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 09:55:13 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 09:55:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 09:55:37 vmfsppjb006 dbus-daemon[10120]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 09:55:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 09:55:38 vmfsppjb006 setroubleshoot[10120]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 09:55:39 vmfsppjb006 setroubleshoot[10120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 09:55:39 vmfsppjb006 platform-python[10120]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 09:58:05 vmfsppjb006 chronyd[908]: Source 118.27.19.72 replaced with 132.226.11.60
Oct 28 10:00:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:00:37 vmfsppjb006 dbus-daemon[10415]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:00:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:00:38 vmfsppjb006 setroubleshoot[10415]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:00:39 vmfsppjb006 setroubleshoot[10415]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:00:39 vmfsppjb006 platform-python[10415]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:06:01 vmfsppjb006 logrotate[10736]: ALERT exited abnormally with [1]
Oct 28 10:06:02 vmfsppjb006 rhsmd[10746]: In order for Subscription Manager to provide your system with updates, your system must be registered with the Customer Portal. Please enter your Red Hat login to ensure your system is up-to-date.
Oct 28 10:06:04 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:06:04 vmfsppjb006 dbus-daemon[10751]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:06:05 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:06:05 vmfsppjb006 setroubleshoot[10751]: failed to retrieve rpm info for /var/opt/microsoft/omsconfig/omsconfig.log
Oct 28 10:06:09 vmfsppjb006 setroubleshoot[10751]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log. For complete SELinux messages run: sealert -l 032b50b8-a43a-405d-88e8-f8bba97fe952
Oct 28 10:06:09 vmfsppjb006 platform-python[10751]: SELinux is preventing logrotate from getattr access on the file /var/opt/microsoft/omsconfig/omsconfig.log.#012#012*****  Plugin restorecon (94.8 confidence) suggests   ************************#012#012If you want to fix the label. #012/var/opt/microsoft/omsconfig/omsconfig.log default label should be var_log_t.#012Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly.#012Do#012# /sbin/restorecon -v /var/opt/microsoft/omsconfig/omsconfig.log#012#012*****  Plugin catchall_labels (5.21 confidence) suggests   *******************#012#012If you want to allow logrotate to have getattr access on the omsconfig.log file#012Then you need to change the label on /var/opt/microsoft/omsconfig/omsconfig.log#012Do#012# semanage fcontext -a -t FILE_TYPE '/var/opt/microsoft/omsconfig/omsconfig.log'#012where FILE_TYPE is one of the following: NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_log_t, NetworkManager_tmp_t, NetworkManager_unit_file_t, NetworkManager_var_run_t, abrt_dump_oops_exec_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_worker_exec_t, abrt_tmp_t, abrt_unit_file_t, abrt_upload_watch_exec_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_log_t, abrt_var_run_t, abrt_watch_log_exec_t, accountsd_exec_t, accountsd_unit_file_t, acct_data_t, acct_exec_t, acct_initrc_exec_t, admin_crontab_tmp_t, admin_passwd_exec_t, afs_bosserver_exec_t, afs_exec_t, afs_fsserver_exec_t, afs_initrc_exec_t, afs_kaserver_exec_t, afs_logfile_t, afs_ptserver_exec_t, afs_vlserver_exec_t, aiccu_exec_t, aiccu_initrc_exec_t, aiccu_var_run_t, aide_exec_t, aide_log_t, ajaxterm_exec_t, ajaxterm_initrc_exec_t, ajaxterm_var_run_t, alsa_exec_t, alsa_tmp_t, alsa_unit_file_t, alsa_var_run_t, amanda_exec_t, amanda_inetd_exec_t, amanda_log_t, amanda_recover_exec_t, amanda_tmp_t, amanda_unit_file_t, amtu_exec_t, amtu_initrc_exec_t, anaconda_exec_t, anacron_exec_t, anon_inodefs_t, antivirus_exec_t, antivirus_initrc_exec_t, antivirus_log_t, antivirus_tmp_t, antivirus_unit_file_t, antivirus_var_run_t, apcupsd_cgi_script_exec_t, apcupsd_exec_t, apcupsd_initrc_exec_t, apcupsd_log_t, apcupsd_tmp_t, apcupsd_unit_file_t, apcupsd_var_run_t, apm_exec_t, apmd_exec_t, apmd_initrc_exec_t, apmd_log_t, apmd_tmp_t, apmd_unit_file_t, apmd_var_run_t, arpwatch_exec_t, arpwatch_initrc_exec_t, arpwatch_tmp_t, arpwatch_unit_file_t, arpwatch_var_run_t, asterisk_exec_t, asterisk_initrc_exec_t, asterisk_log_t, asterisk_tmp_t, asterisk_var_run_t, audisp_exec_t, audisp_remote_exec_t, audisp_var_run_t, auditadm_sudo_tmp_t, auditctl_exec_t, auditd_exec_t, auditd_initrc_exec_t, auditd_log_t, auditd_tmp_t, auditd_unit_file_t, auditd_var_run_t, auoms_exec_t, auth_cache_t, authconfig_exec_t, automount_exec_t, automount_initrc_exec_t, automount_tmp_t, automount_unit_file_t, automount_var_run_t, avahi_exec_t, avahi_initrc_exec_t, avahi_unit_file_t, avahi_var_run_t, awstats_exec_t, awstats_script_exec_t, awstats_tmp_t, bacula_admin_exec_t, bacula_exec_t, bacula_initrc_exec_t, bacula_log_t, bacula_tmp_t, bacula_unconfined_script_exec_t, bacula_var_run_t, bcfg2_exec_t, bcfg2_initrc_exec_t, bcfg2_unit_file_t, bcfg2_var_run_t, bin_t, bitlbee_exec_t, bitlbee_initrc_exec_t, bitlbee_log_t, bitlbee_tmp_t, bitlbee_var_run_t, blkmapd_exec_t, blkmapd_initrc_exec_t, blkmapd_var_run_t, blktap_exec_t, blktap_var_run_t, blueman_exec_t, blueman_tmp_t, blueman_var_run_t, bluetooth_exec_t, bluetooth_helper_exec_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_initrc_exec_t, bluetooth_tmp_t, bluetooth_unit_file_t, bluetooth_var_run_t, boinc_exec_t, boinc_initrc_exec_t, boinc_log_t, boinc_project_tmp_t, boinc_tmp_t, boinc_unit_file_t, boltd_exec_t, boltd_var_run_t, boot_t, bootloader_exec_t, bootloader_tmp_t, bootloader_var_run_t, brctl_exec_t, brltty_exec_t, brltty_log_t, brltty_unit_file_t, brltty_var_run_t, bugzilla_script_exec_t, bugzilla_tmp_t, bumblebee_exec_t, bumblebee_unit_file_t, bumblebee_var_run_t, cachefilesd_exec_t, cachefilesd_var_run_t, calamaris_exec_t, calamaris_log_t, callweaver_exec_t, callweaver_initrc_exec_t, callweaver_log_t, callweaver_var_run_t, canna_exec_t, canna_initrc_exec_t, canna_log_t, canna_var_run_t, cardctl_exec_t, cardmgr_dev_t, cardmgr_exec_t, cardmgr_var_run_t, ccs_exec_t, ccs_initrc_exec_t, ccs_tmp_t, ccs_var_lib_t, ccs_var_log_t, ccs_var_run_t, cdcc_exec_t, cdcc_tmp_t, cdrecord_exec_t, cert_t, certmaster_exec_t, certmaster_initrc_exec_t, certmaster_var_log_t, certmaster_var_run_t, certmonger_exec_t, certmonger_initrc_exec_t, certmonger_tmp_t, certmonger_unconfined_exec_t, certmonger_unit_file_t, certmonger_var_run_t, certwatch_exec_t, cfengine_execd_exec_t, cfengine_initrc_exec_t, cfengine_log_t, cfengine_monitord_exec_t, cfengine_serverd_exec_t, cgclear_exec_t, cgconfig_exec_t, cgconfig_initrc_exec_t, cgdcbxd_exec_t, cgdcbxd_unit_file_t, cgdcbxd_var_run_t, cgred_exec_t, cgred_initrc_exec_t, cgred_log_t, cgred_var_run_t, cgroup_t, checkpc_exec_t, checkpc_log_t, checkpolicy_exec_t, chfn_exec_t, chkpwd_exec_t, chrome_sandbox_exec_t, chrome_sandbox_nacl_exec_t, chrome_sandbox_tmp_t, chronyc_exec_t, chronyd_exec_t, chronyd_initrc_exec_t, chronyd_keys_t, chronyd_tmp_t, chronyd_unit_file_t, chronyd_var_log_t, chronyd_var_run_t, chroot_exec_t, cifs_t, cinder_api_exec_t, cinder_api_tmp_t, cinder_api_unit_file_t, cinder_backup_exec_t, cinder_backup_tmp_t, cinder_backup_unit_file_t, cinder_log_t, cinder_scheduler_exec_t, cinder_scheduler_tmp_t, cinder_scheduler_unit_file_t, cinder_var_run_t, cinder_volume_exec_t, cinder_volume_tmp_t, cinder_volume_unit_file_t, ciped_exec_t, ciped_initrc_exec_t, clogd_exec_t, clogd_var_run_t, cloud_init_exec_t, cloud_init_tmp_t, cloud_init_unit_file_t, cloud_log_t, cluster_conf_t, cluster_exec_t, cluster_initrc_exec_t, cluster_tmp_t, cluster_unit_file_t, cluster_var_lib_t, cluster_var_log_t, cluster_var_run_t, clvmd_exec_t, clvmd_initrc_exec_t, clvmd_var_run_t, cmirrord_exec_t, cmirrord_initrc_exec_t, cmirrord_var_run_t, cobbler_tmp_t, cobbler_var_log_t, cobblerd_exec_t, cobblerd_initrc_exec_t, cockpit_session_exec_t, cockpit_tmp_t, cockpit_tmpfs_t, cockpit_unit_file_t, cockpit_var_run_t, cockpit_ws_exec_t, collectd_exec_t, collectd_initrc_exec_t, collectd_log_t, collectd_script_exec_t, collectd_script_tmp_t, collectd_unit_file_t, collectd_var_run_t, colord_exec_t, colord_tmp_t, colord_unit_file_t, comsat_exec_t, comsat_tmp_t, comsat_var_run_t, condor_collector_exec_t, condor_initrc_exec_t, condor_log_t, condor_master_exec_t, condor_master_tmp_t, condor_negotiator_exec_t, condor_procd_exec_t, condor_schedd_exec_t, condor_schedd_tmp_t, condor_startd_exec_t, condor_startd_tmp_t, condor_unit_file_t, condor_var_run_t, conman_exec_t, conman_log_t, conman_tmp_t, conman_unconfined_script_exec_t, conman_unit_file_t, conman_var_run_t, conntrackd_exec_t, conntrackd_initrc_exec_t, conntrackd_log_t, conntrackd_unit_file_t, conntrackd_var_run_t, consolehelper_exec_t, consolekit_exec_t, consolekit_log_t, consolekit_unit_file_t, consolekit_var_run_t, couchdb_exec_t, couchdb_initrc_exec_t, couchdb_log_t, couchdb_tmp_t, couchdb_unit_file_t, couchdb_var_run_t, courier_authdaemon_exec_t, courier_exec_t, courier_pcp_exec_t, courier_pop_exec_t, courier_sqwebmail_exec_t, courier_tcpd_exec_t, courier_var_run_t, cpu_online_t, cpucontrol_exec_t, cpufreqselector_exec_t, cpuplug_exec_t, cpuplug_initrc_exec_t, cpuplug_var_run_t, cpuspeed_exec_t, cpuspeed_var_run_t, crack_exec_t, crack_tmp_t, cron_log_t, cron_var_run_t, crond_exec_t, crond_initrc_exec_t, crond_tmp_t, crond_unit_file_t, crond_var_run_t, crontab_exec_t, crontab_tmp_t, ctdbd_exec_t, ctdbd_initrc_exec_t, ctdbd_log_t, ctdbd_tmp_t, ctdbd_var_run_t, cups_pdf_exec_t, cups_pdf_tmp_t, cupsd_config_exec_t, cupsd_config_var_run_t, cupsd_exec_t, cupsd_initrc_exec_t, cupsd_log_t, cupsd_lpd_exec_t, cupsd_lpd_tmp_t, cupsd_lpd_var_run_t, cupsd_tmp_t, cupsd_unit_file_t, cupsd_var_run_t, cvs_exec_t, cvs_initrc
Oct 28 10:06:34 vmfsppjb006 python3.6[1694]: 2021-10-28T01:06:34.094830Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 10:06:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:06:37 vmfsppjb006 dbus-daemon[10791]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:06:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:06:38 vmfsppjb006 setroubleshoot[10791]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:06:39 vmfsppjb006 setroubleshoot[10791]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:06:39 vmfsppjb006 platform-python[10791]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:07:16 vmfsppjb006 python3.6[1694]: 2021-10-28T01:07:16.244366Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 2;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 10:08:59 vmfsppjb006 powershell[10934]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:09:00 vmfsppjb006 powershell[10934]: (7.1.4:8:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 10934 in AppDomain: None.
Oct 28 10:09:00 vmfsppjb006 systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 10943 (.NET ThreadPool)
Oct 28 10:09:00 vmfsppjb006 systemd[1]: Mounting Arbitrary Executable File Formats File System...
Oct 28 10:09:00 vmfsppjb006 systemd[1]: Mounted Arbitrary Executable File Formats File System.
Oct 28 10:09:00 vmfsppjb006 powershell[10934]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 10:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 10:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 10:09:01 vmfsppjb006 systemd[1]: Started Session 13 of user omsagent.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Reached target Timers.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Reached target Paths.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Starting D-Bus User Message Bus Socket.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Listening on D-Bus User Message Bus Socket.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Reached target Sockets.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Reached target Basic System.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Reached target Default.
Oct 28 10:09:01 vmfsppjb006 systemd[10963]: Startup finished in 51ms.
Oct 28 10:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Stopped target Default.
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Stopped target Basic System.
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Stopped target Paths.
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Stopped target Sockets.
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Closed D-Bus User Message Bus Socket.
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Reached target Shutdown.
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Starting Exit the Session...
Oct 28 10:09:02 vmfsppjb006 systemd[10963]: Stopped target Timers.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 11006 (systemctl) with signal SIGKILL.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 10:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 10:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 10:09:03 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 10:09:03 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 10:09:03 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 70d688b2-857e-4f04-a781-2443f6ef2b2a#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 10:09:03 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:03 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:03 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:03 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:04 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:04 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:04 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:04 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:04 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:04 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:04 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 7270ce10-848c-4584-8e35-ad1ca408f004#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 30#012        Engine Version = 7.1.4#012        Runspace ID = 2ca71f64-b730-4a02-8da5-03da2c81c6e5#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:09:16 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 3):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 10:09:16 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 3):#012TFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGc
Oct 28 10:09:16 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (3 of 3):#012gBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: d23e2c9d-c1cc-4d6d-bc96-13e562be603c#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 10:09:16 vmfsppjb006 powershell[10934]: (7.1.4:A:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: b9b31f0d-e013-4efd-a66f-02beffbab759#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 10:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:09:37 vmfsppjb006 dbus-daemon[11069]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:09:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:09:38 vmfsppjb006 setroubleshoot[11069]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:09:39 vmfsppjb006 setroubleshoot[11069]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:09:39 vmfsppjb006 platform-python[11069]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:10:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:10:37 vmfsppjb006 dbus-daemon[11137]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:10:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:10:38 vmfsppjb006 setroubleshoot[11137]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:10:39 vmfsppjb006 setroubleshoot[11137]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:10:39 vmfsppjb006 platform-python[11137]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:16:10 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 28 10:16:10 vmfsppjb006 systemd[1]: Started Session 15 of user finsrvpf.
Oct 28 10:16:10 vmfsppjb006 systemd-logind[943]: New session 15 of user finsrvpf.
Oct 28 10:16:10 vmfsppjb006 dnf[11466]: Metadata cache refreshed recently.
Oct 28 10:16:10 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 28 10:16:17 vmfsppjb006 su[11500]: (to jobuser) finsrvpf on pts/3
Oct 28 10:16:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:16:37 vmfsppjb006 dbus-daemon[11555]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:16:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:16:38 vmfsppjb006 setroubleshoot[11555]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:16:39 vmfsppjb006 setroubleshoot[11555]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:16:39 vmfsppjb006 platform-python[11555]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:17:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:17:37 vmfsppjb006 dbus-daemon[11614]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:17:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:17:38 vmfsppjb006 setroubleshoot[11614]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:17:39 vmfsppjb006 setroubleshoot[11614]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:17:39 vmfsppjb006 platform-python[11614]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:18:49 vmfsppjb006 powershell[11690]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:18:49 vmfsppjb006 powershell[11690]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 11690 in AppDomain: None.
Oct 28 10:18:49 vmfsppjb006 powershell[11690]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:19:16 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 10:19:17 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 10:19:17 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 10:19:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:19:37 vmfsppjb006 dbus-daemon[11854]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:19:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:19:38 vmfsppjb006 setroubleshoot[11854]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:19:39 vmfsppjb006 setroubleshoot[11854]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:19:39 vmfsppjb006 platform-python[11854]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:22:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:22:37 vmfsppjb006 dbus-daemon[12057]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:22:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:22:38 vmfsppjb006 setroubleshoot[12057]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:22:39 vmfsppjb006 setroubleshoot[12057]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:22:39 vmfsppjb006 platform-python[12057]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Started Session 16 of user omsagent.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Starting D-Bus User Message Bus Socket.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Reached target Paths.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Reached target Timers.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Listening on D-Bus User Message Bus Socket.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Reached target Sockets.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Reached target Basic System.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Reached target Default.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Startup finished in 46ms.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Stopped target Default.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Stopped target Basic System.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Stopped target Timers.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Stopped target Paths.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Stopped target Sockets.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Closed D-Bus User Message Bus Socket.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Reached target Shutdown.
Oct 28 10:24:01 vmfsppjb006 systemd[12159]: Starting Exit the Session...
Oct 28 10:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 12201 (systemctl) with signal SIGKILL.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 10:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 10:24:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:24:37 vmfsppjb006 dbus-daemon[12254]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:24:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:24:38 vmfsppjb006 setroubleshoot[12254]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:24:39 vmfsppjb006 setroubleshoot[12254]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:24:39 vmfsppjb006 platform-python[12254]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:30:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:30:37 vmfsppjb006 dbus-daemon[12647]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:30:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:30:37 vmfsppjb006 setroubleshoot[12647]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:30:38 vmfsppjb006 setroubleshoot[12647]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:30:38 vmfsppjb006 platform-python[12647]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:30:57 vmfsppjb006 powershell[12672]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:30:57 vmfsppjb006 powershell[12672]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 12672 in AppDomain: None.
Oct 28 10:30:57 vmfsppjb006 powershell[12672]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 113ecb1c-8c15-4c71-b44d-55d4cc5045b5#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:30:58 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3504ffec-688e-4827-8a4b-4455a46f572b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = a250de48-add1-438e-a4c6-f98cf673aef3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:31:11 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 10:31:11 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#0129uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQw
Oct 28 10:31:11 vmfsppjb006 powershell[12672]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 1cc6eb6b-cdbd-4bb1-9f37-6e9d77a92091#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 10:31:13 vmfsppjb006 powershell[12672]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 12672 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 10:35:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:35:37 vmfsppjb006 dbus-daemon[12991]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:35:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:35:37 vmfsppjb006 setroubleshoot[12991]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:35:38 vmfsppjb006 setroubleshoot[12991]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:35:38 vmfsppjb006 platform-python[12991]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:37:21 vmfsppjb006 python3.6[1694]: 2021-10-28T01:37:21.653278Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 3;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 10:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 10:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 10:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 10:39:01 vmfsppjb006 systemd[1]: Started Session 18 of user omsagent.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Reached target Paths.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Starting D-Bus User Message Bus Socket.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Reached target Timers.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Listening on D-Bus User Message Bus Socket.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Reached target Sockets.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Reached target Basic System.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Reached target Default.
Oct 28 10:39:01 vmfsppjb006 systemd[13200]: Startup finished in 46ms.
Oct 28 10:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 10:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Stopped target Default.
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Stopped target Basic System.
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Stopped target Timers.
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Stopped target Sockets.
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Closed D-Bus User Message Bus Socket.
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Stopped target Paths.
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Reached target Shutdown.
Oct 28 10:39:02 vmfsppjb006 systemd[13200]: Starting Exit the Session...
Oct 28 10:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 13242 (systemctl) with signal SIGKILL.
Oct 28 10:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 10:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 10:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 10:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 10:39:29 vmfsppjb006 powershell[13294]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:39:29 vmfsppjb006 powershell[13294]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 13294 in AppDomain: None.
Oct 28 10:39:29 vmfsppjb006 powershell[13294]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:39:30 vmfsppjb006 finsrvpf[13311]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[  ], ResourceGroupName:[  ], VirtualMachineName:[  ]
Oct 28 10:39:30 vmfsppjb006 powershell[13294]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 13294 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 10:39:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:39:37 vmfsppjb006 dbus-daemon[13326]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:39:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:39:37 vmfsppjb006 setroubleshoot[13326]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:39:38 vmfsppjb006 setroubleshoot[13326]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:39:38 vmfsppjb006 platform-python[13326]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:40:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:40:37 vmfsppjb006 dbus-daemon[13387]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:40:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:40:38 vmfsppjb006 setroubleshoot[13387]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:40:38 vmfsppjb006 setroubleshoot[13387]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:40:38 vmfsppjb006 platform-python[13387]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:43:19 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 10:43:20 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 10:43:20 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 10:45:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:45:37 vmfsppjb006 dbus-daemon[13784]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:45:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:45:38 vmfsppjb006 setroubleshoot[13784]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:45:38 vmfsppjb006 setroubleshoot[13784]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:45:38 vmfsppjb006 platform-python[13784]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 14098 in AppDomain: None.
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: d935c874-283b-4dc9-acb1-e475ff580758#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:38 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b6eacc22-575d-4f44-8da4-69d2cdcb861b#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 38ba7d6a-c225-4e6f-9840-b4897ba6c515#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 10:50:51 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 10:50:51 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012Fi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: ce910fdb-63e6-4c0c-a696-db6e949acb08#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 10:50:51 vmfsppjb006 powershell[14098]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: fe527480-f9c3-419f-8685-4751fa5d0b96#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 10:50:53 vmfsppjb006 powershell[14098]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 14098 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 10:51:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:51:37 vmfsppjb006 dbus-daemon[14174]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:51:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:51:38 vmfsppjb006 setroubleshoot[14174]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:51:38 vmfsppjb006 setroubleshoot[14174]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:51:38 vmfsppjb006 platform-python[14174]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:52:00 vmfsppjb006 powershell[14215]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:52:00 vmfsppjb006 powershell[14215]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 14215 in AppDomain: None.
Oct 28 10:52:00 vmfsppjb006 powershell[14215]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:52:00 vmfsppjb006 finsrvpf[14232]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[  ]
Oct 28 10:52:00 vmfsppjb006 powershell[14215]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 14215 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 10:52:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:52:37 vmfsppjb006 dbus-daemon[14268]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:52:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:52:38 vmfsppjb006 setroubleshoot[14268]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:52:38 vmfsppjb006 setroubleshoot[14268]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:52:38 vmfsppjb006 platform-python[14268]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:53:52 vmfsppjb006 powershell[14352]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:53:52 vmfsppjb006 powershell[14352]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 14352 in AppDomain: None.
Oct 28 10:53:52 vmfsppjb006 powershell[14352]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:53:52 vmfsppjb006 finsrvpf[14369]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ start ], ResourceGroupName:[  ], VirtualMachineName:[  ]
Oct 28 10:53:52 vmfsppjb006 powershell[14352]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 14352 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Started Session 20 of user omsagent.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Starting D-Bus User Message Bus Socket.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Reached target Timers.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Reached target Paths.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Listening on D-Bus User Message Bus Socket.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Reached target Sockets.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Reached target Basic System.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Reached target Default.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Startup finished in 45ms.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Stopped target Default.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Stopped target Basic System.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Stopped target Timers.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Stopped target Sockets.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Closed D-Bus User Message Bus Socket.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Stopped target Paths.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Reached target Shutdown.
Oct 28 10:54:01 vmfsppjb006 systemd[14375]: Starting Exit the Session...
Oct 28 10:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 14417 (systemctl) with signal SIGKILL.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 10:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 10:54:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:54:37 vmfsppjb006 dbus-daemon[14474]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:54:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:54:38 vmfsppjb006 setroubleshoot[14474]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:54:38 vmfsppjb006 setroubleshoot[14474]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:54:38 vmfsppjb006 platform-python[14474]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:55:56 vmfsppjb006 powershell[14563]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:55:56 vmfsppjb006 powershell[14563]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 14563 in AppDomain: None.
Oct 28 10:55:56 vmfsppjb006 powershell[14563]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:55:56 vmfsppjb006 finsrvpf[14580]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ rg-finsrvpf-prod-001 ], ResourceGroupName:[ vmfsppjb004 ], VirtualMachineName:[ 11 ]
Oct 28 10:55:56 vmfsppjb006 powershell[14563]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 14563 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 10:56:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 10:56:37 vmfsppjb006 dbus-daemon[14618]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 10:56:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 10:56:38 vmfsppjb006 setroubleshoot[14618]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 10:56:38 vmfsppjb006 setroubleshoot[14618]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 10:56:38 vmfsppjb006 platform-python[14618]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 10:59:31 vmfsppjb006 powershell[14806]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 10:59:31 vmfsppjb006 powershell[14806]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 14806 in AppDomain: None.
Oct 28 10:59:31 vmfsppjb006 powershell[14806]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 10:59:31 vmfsppjb006 finsrvpf[14823]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ xxxx ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 10:59:31 vmfsppjb006 powershell[14806]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 14806 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:00:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:00:37 vmfsppjb006 dbus-daemon[14894]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:00:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:00:38 vmfsppjb006 setroubleshoot[14894]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:00:38 vmfsppjb006 setroubleshoot[14894]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:00:38 vmfsppjb006 platform-python[14894]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:05:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:05:37 vmfsppjb006 dbus-daemon[15226]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:05:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:05:38 vmfsppjb006 setroubleshoot[15226]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:05:39 vmfsppjb006 setroubleshoot[15226]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:05:39 vmfsppjb006 platform-python[15226]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:06:39 vmfsppjb006 python3.6[1694]: 2021-10-28T02:06:39.012102Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 11:07:22 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 11:07:23 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 11:07:23 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 11:07:27 vmfsppjb006 python3.6[1694]: 2021-10-28T02:07:27.216821Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 4;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 11:08:08 vmfsppjb006 powershell[15456]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:08:08 vmfsppjb006 powershell[15456]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 15456 in AppDomain: None.
Oct 28 11:08:08 vmfsppjb006 powershell[15456]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:08:08 vmfsppjb006 finsrvpf[15473]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 11:08:08 vmfsppjb006 powershell[15456]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 15456 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:08:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:08:37 vmfsppjb006 dbus-daemon[15511]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:08:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:08:38 vmfsppjb006 setroubleshoot[15511]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:08:39 vmfsppjb006 setroubleshoot[15511]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:08:39 vmfsppjb006 platform-python[15511]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Started Session 22 of user omsagent.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Starting D-Bus User Message Bus Socket.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Reached target Timers.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Reached target Paths.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Listening on D-Bus User Message Bus Socket.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Reached target Sockets.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Reached target Basic System.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Reached target Default.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Startup finished in 46ms.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Stopped target Default.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Stopped target Basic System.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Stopped target Paths.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Stopped target Timers.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Stopped target Sockets.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Closed D-Bus User Message Bus Socket.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Reached target Shutdown.
Oct 28 11:09:01 vmfsppjb006 systemd[15550]: Starting Exit the Session...
Oct 28 11:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 15592 (systemctl) with signal SIGKILL.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 11:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 11:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:09:37 vmfsppjb006 dbus-daemon[15638]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:09:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:09:38 vmfsppjb006 setroubleshoot[15638]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:09:39 vmfsppjb006 setroubleshoot[15638]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:09:39 vmfsppjb006 platform-python[15638]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:11:10 vmfsppjb006 powershell[15742]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:11:10 vmfsppjb006 powershell[15742]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 15742 in AppDomain: None.
Oct 28 11:11:11 vmfsppjb006 powershell[15742]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:11:11 vmfsppjb006 finsrvpf[15759]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 11:11:11 vmfsppjb006 powershell[15742]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 15742 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:11:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:11:37 vmfsppjb006 dbus-daemon[15779]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:11:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:11:38 vmfsppjb006 setroubleshoot[15779]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:11:39 vmfsppjb006 setroubleshoot[15779]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:11:39 vmfsppjb006 platform-python[15779]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:13:13 vmfsppjb006 powershell[15885]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:13:13 vmfsppjb006 powershell[15885]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 15885 in AppDomain: None.
Oct 28 11:13:13 vmfsppjb006 powershell[15885]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: ceea4b9e-62a0-41b1-94dc-5e5c461c52de#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:14 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 53173744-5e88-4fb1-9971-1d3edd8a8c44#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 START rg-finsrvpf-prod-001 vmfsppjb004 11 31#012        Engine Version = 7.1.4#012        Runspace ID = 763fd416-9246-4809-9e9f-80239278a67d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:13:26 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:13:26 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012nb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎#
Oct 28 11:13:26 vmfsppjb006 powershell[15885]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: ca5e9c6a-f28c-4190-9705-32011d82c481#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:13:28 vmfsppjb006 powershell[15885]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 15885 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:15:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:15:37 vmfsppjb006 dbus-daemon[16064]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:15:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:15:38 vmfsppjb006 setroubleshoot[16064]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:15:39 vmfsppjb006 setroubleshoot[16064]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:15:39 vmfsppjb006 platform-python[16064]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:15:52 vmfsppjb006 powershell[16088]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:15:52 vmfsppjb006 powershell[16088]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 16088 in AppDomain: None.
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 66927fba-2e4b-440a-96ac-dae07e8a65bd#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:15:53 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 3b716466-caf9-4d36-a5c8-6ad9b8fb7bea#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-xxxxxx-xxx vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = e9e09b79-97c3-4e4f-841d-f089a93c060a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:16:06 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:16:06 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012rBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: caac94c1-8754-43d1-a7df-d9743068c710#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:16:06 vmfsppjb006 powershell[16088]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 30df6a5c-9c77-4546-b862-35be66ede8fa#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:16:08 vmfsppjb006 finsrvpf[16128]: VM Start/Stop Script is failed. Cause:[ Command failed ], Operation:[ start ], ResourceGroupName:[ rg-xxxxxx-xxx ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 11:16:08 vmfsppjb006 powershell[16088]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 16088 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:16:12 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 28 11:16:12 vmfsppjb006 dnf[16132]: Metadata cache refreshed recently.
Oct 28 11:16:12 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 28 11:16:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:16:37 vmfsppjb006 dbus-daemon[16166]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:16:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:16:38 vmfsppjb006 setroubleshoot[16166]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:16:39 vmfsppjb006 setroubleshoot[16166]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:16:39 vmfsppjb006 platform-python[16166]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 16289 in AppDomain: None.
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: fe3d9db9-76f5-46ca-83a3-20fb20d974dd#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:29 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 06fe4784-a2ad-4655-a689-4022feea7d31#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 5b1d0609-6bc2-4edf-b043-954de59160b6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:18:37 vmfsppjb006 dbus-daemon[16323]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:18:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:18:38 vmfsppjb006 setroubleshoot[16323]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:18:39 vmfsppjb006 setroubleshoot[16323]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:18:39 vmfsppjb006 platform-python[16323]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:18:42 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 3):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:18:42 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 3):#012BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFp
Oct 28 11:18:42 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (3 of 3):#012⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: cbfe048b-4218-4d5f-9c37-c6e1cbcedbec#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:18:42 vmfsppjb006 powershell[16289]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 56e24c72-8858-4abb-8c42-9fc8d48e9b84#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:18:44 vmfsppjb006 finsrvpf[16336]: VM Start/Stop Script is failed. Cause:[ Command failed ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfxxxxx ]
Oct 28 11:18:44 vmfsppjb006 powershell[16289]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 16289 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:18:54 vmfsppjb006 powershell[16353]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:18:54 vmfsppjb006 powershell[16353]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 16353 in AppDomain: None.
Oct 28 11:18:54 vmfsppjb006 powershell[16353]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:18:54 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:18:54 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 13c029ef-0efe-4445-950f-901b44310017#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:18:55 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 8ec0be92-9646-4115-9c52-05e6d837d8e3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = 8c5fbe79-8e53-40d0-9daa-4cde04462f87#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:07 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:19:07 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012wAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/O
Oct 28 11:19:07 vmfsppjb006 powershell[16353]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: b9c6e9c8-c3b5-41d9-95e1-b47675192563#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:19:09 vmfsppjb006 finsrvpf[16393]: VM Start/Stop Script is failed. Cause:[ Command failed ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmxxxxxxx ]
Oct 28 11:19:09 vmfsppjb006 powershell[16353]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 16353 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 16403 in AppDomain: None.
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 4bdad4f4-44e6-4703-a890-17253f59f65f#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:21 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 023f8fc7-1061-44e7-b1d3-0e7483d87155#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmxxxxxxx#012        Engine Version = 7.1.4#012        Runspace ID = c251cd45-bb86-404a-b858-0aa09e83d77a#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:19:33 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:19:33 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2
Oct 28 11:19:33 vmfsppjb006 powershell[16403]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 7640cb1d-d58c-4358-b546-abb8ee1d3e2a#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:19:35 vmfsppjb006 finsrvpf[16447]: VM Start/Stop Script is failed. Cause:[ Command failed ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmxxxxxxx ]
Oct 28 11:19:35 vmfsppjb006 powershell[16403]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 16403 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:20:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:20:37 vmfsppjb006 dbus-daemon[16512]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:20:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:20:38 vmfsppjb006 setroubleshoot[16512]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:20:39 vmfsppjb006 setroubleshoot[16512]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:20:39 vmfsppjb006 platform-python[16512]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 11:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 11:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 11:24:01 vmfsppjb006 systemd[1]: Started Session 24 of user omsagent.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Reached target Paths.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Starting D-Bus User Message Bus Socket.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Reached target Timers.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Listening on D-Bus User Message Bus Socket.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Reached target Sockets.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Reached target Basic System.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Reached target Default.
Oct 28 11:24:01 vmfsppjb006 systemd[16726]: Startup finished in 47ms.
Oct 28 11:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 11:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Stopped target Default.
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Stopped target Basic System.
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Stopped target Sockets.
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Closed D-Bus User Message Bus Socket.
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Stopped target Timers.
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Stopped target Paths.
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Reached target Shutdown.
Oct 28 11:24:02 vmfsppjb006 systemd[16726]: Starting Exit the Session...
Oct 28 11:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 16768 (systemctl) with signal SIGKILL.
Oct 28 11:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 11:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 11:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 11:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 11:24:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:24:37 vmfsppjb006 dbus-daemon[16816]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:24:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:24:38 vmfsppjb006 setroubleshoot[16816]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:24:39 vmfsppjb006 setroubleshoot[16816]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:24:39 vmfsppjb006 platform-python[16816]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:32:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:32:37 vmfsppjb006 dbus-daemon[17319]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:32:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:32:38 vmfsppjb006 setroubleshoot[17319]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:32:39 vmfsppjb006 setroubleshoot[17319]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:32:39 vmfsppjb006 platform-python[17319]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:37:29 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 28 11:37:29 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 28 11:37:29 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 28 11:37:29 vmfsppjb006 systemd[1]: Started Session c1 of user root.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Reached target Paths.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Starting D-Bus User Message Bus Socket.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Reached target Timers.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Listening on D-Bus User Message Bus Socket.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Reached target Sockets.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Reached target Basic System.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Reached target Default.
Oct 28 11:37:29 vmfsppjb006 systemd[17694]: Startup finished in 46ms.
Oct 28 11:37:29 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 28 11:37:29 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 28 11:37:29 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Stopped target Default.
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Stopped target Basic System.
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Stopped target Sockets.
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Stopped target Timers.
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Stopped target Paths.
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Closed D-Bus User Message Bus Socket.
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Reached target Shutdown.
Oct 28 11:37:30 vmfsppjb006 systemd[17694]: Starting Exit the Session...
Oct 28 11:37:30 vmfsppjb006 systemd[1]: user@0.service: Killing process 17728 (systemctl) with signal SIGKILL.
Oct 28 11:37:30 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 28 11:37:30 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 28 11:37:30 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 28 11:37:30 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 28 11:37:30 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 28 11:37:30 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 28 11:37:32 vmfsppjb006 python3.6[1694]: 2021-10-28T02:37:32.555962Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 5;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 11:37:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:37:37 vmfsppjb006 dbus-daemon[17758]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:37:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:37:37 vmfsppjb006 setroubleshoot[17758]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:37:38 vmfsppjb006 setroubleshoot[17758]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:37:38 vmfsppjb006 platform-python[17758]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Started Session 27 of user omsagent.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Reached target Paths.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Starting D-Bus User Message Bus Socket.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Reached target Timers.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Listening on D-Bus User Message Bus Socket.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Reached target Sockets.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Reached target Basic System.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Reached target Default.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Startup finished in 47ms.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Stopped target Default.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Stopped target Basic System.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Stopped target Sockets.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Stopped target Timers.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Stopped target Paths.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Closed D-Bus User Message Bus Socket.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Reached target Shutdown.
Oct 28 11:39:01 vmfsppjb006 systemd[17846]: Starting Exit the Session...
Oct 28 11:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 17887 (systemctl) with signal SIGKILL.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 11:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 11:39:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:39:37 vmfsppjb006 dbus-daemon[17932]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:39:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:39:37 vmfsppjb006 setroubleshoot[17932]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:39:38 vmfsppjb006 setroubleshoot[17932]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:39:38 vmfsppjb006 platform-python[17932]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:40:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:40:37 vmfsppjb006 dbus-daemon[18004]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:40:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:40:37 vmfsppjb006 setroubleshoot[18004]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:40:38 vmfsppjb006 setroubleshoot[18004]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:40:38 vmfsppjb006 platform-python[18004]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:43:17 vmfsppjb006 powershell[11690]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 11690 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:43:22 vmfsppjb006 systemd-logind[943]: Session 15 logged out. Waiting for processes to exit.
Oct 28 11:43:22 vmfsppjb006 systemd-logind[943]: Removed session 15.
Oct 28 11:43:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:43:37 vmfsppjb006 dbus-daemon[18197]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:43:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:43:37 vmfsppjb006 setroubleshoot[18197]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:43:38 vmfsppjb006 setroubleshoot[18197]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:43:38 vmfsppjb006 platform-python[18197]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:44:28 vmfsppjb006 powershell[18257]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:44:28 vmfsppjb006 powershell[18257]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 18257 in AppDomain: None.
Oct 28 11:44:28 vmfsppjb006 powershell[18257]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: c3cf2f7c-ac14-4e82-9230-0e74ac6c876f#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:44:29 vmfsppjb006 powershell[18257]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d9bc0b07-fb5c-4339-82e4-3dfa91530641#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 51da7405-ebbf-4f8d-a5bd-6bd90c8bdb07#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:45:31 vmfsppjb006 finsrvpf[18353]: VM Start/Stop Script is failed. Cause:[ Azure login failed ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 11:45:31 vmfsppjb006 powershell[18257]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 18257 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:45:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:45:37 vmfsppjb006 dbus-daemon[18367]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:45:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:45:37 vmfsppjb006 setroubleshoot[18367]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:45:38 vmfsppjb006 setroubleshoot[18367]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:45:38 vmfsppjb006 platform-python[18367]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:49:00 vmfsppjb006 powershell[18567]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:49:00 vmfsppjb006 powershell[18567]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 18567 in AppDomain: None.
Oct 28 11:49:00 vmfsppjb006 powershell[18567]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 6e484849-c0c2-4919-b81b-b5a776c55916#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:01 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 1f14684d-54c6-4fb1-a3b9-097ddbd7776d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 7b513816-afd8-48ab-9a40-7ed3a81d7fdc#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:49:13 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 3):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:49:13 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 3):#0120wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎
Oct 28 11:49:13 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (3 of 3):#012AQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 8016e37c-d2d8-4a79-bda1-cd973cd2654a#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:49:13 vmfsppjb006 powershell[18567]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 9d4b3289-0110-4e59-b245-82d87e9852e1#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:49:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:49:37 vmfsppjb006 dbus-daemon[18648]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:49:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:49:38 vmfsppjb006 setroubleshoot[18648]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:49:38 vmfsppjb006 setroubleshoot[18648]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:49:38 vmfsppjb006 platform-python[18648]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 11:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 11:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 11:54:01 vmfsppjb006 systemd[1]: Started Session 29 of user omsagent.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Reached target Paths.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Starting D-Bus User Message Bus Socket.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Reached target Timers.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Listening on D-Bus User Message Bus Socket.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Reached target Sockets.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Reached target Basic System.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Reached target Default.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Startup finished in 47ms.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Stopped target Default.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Stopped target Basic System.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Stopped target Paths.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Stopped target Timers.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Stopped target Sockets.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Closed D-Bus User Message Bus Socket.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Reached target Shutdown.
Oct 28 11:54:02 vmfsppjb006 systemd[18892]: Starting Exit the Session...
Oct 28 11:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 18934 (systemctl) with signal SIGKILL.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 11:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 11:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 11:54:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:54:37 vmfsppjb006 dbus-daemon[18978]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:54:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:54:38 vmfsppjb006 setroubleshoot[18978]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:54:38 vmfsppjb006 setroubleshoot[18978]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:54:38 vmfsppjb006 platform-python[18978]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:55:26 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 11:55:27 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 11:55:27 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 11:55:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:55:37 vmfsppjb006 dbus-daemon[19130]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:55:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:55:38 vmfsppjb006 setroubleshoot[19130]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:55:38 vmfsppjb006 setroubleshoot[19130]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:55:38 vmfsppjb006 platform-python[19130]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 19267 in AppDomain: None.
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: ca2ab282-a537-4ce9-8413-131a10115e40#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:43 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4c6b5f66-2ce6-489e-ab3f-3757eb200cc9#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 1 2#012        Engine Version = 7.1.4#012        Runspace ID = 17b3ca2c-e324-4b8b-bbe2-e29b2a0ab207#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:57:55 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:57:55 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012un7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3
Oct 28 11:57:55 vmfsppjb006 powershell[19267]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 3e5c6343-c50f-47b5-8af5-ab6f1b1e8df7#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:58:02 vmfsppjb006 finsrvpf[19307]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 11:58:02 vmfsppjb006 powershell[19267]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 19267 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 11:58:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 11:58:37 vmfsppjb006 dbus-daemon[19339]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 11:58:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 11:58:38 vmfsppjb006 setroubleshoot[19339]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 11:58:38 vmfsppjb006 setroubleshoot[19339]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 11:58:38 vmfsppjb006 platform-python[19339]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 11:59:23 vmfsppjb006 powershell[19393]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 11:59:23 vmfsppjb006 powershell[19393]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 19393 in AppDomain: None.
Oct 28 11:59:23 vmfsppjb006 powershell[19393]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 4769fd5c-9855-4348-9a81-fc37d110118c#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:24 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 598ba3c4-23ab-4bef-baa2-52c795cd51d3#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = ea20d22a-df33-42f8-844f-8b08f3019dd0#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 11:59:36 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 11:59:36 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012Gn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVV
Oct 28 11:59:37 vmfsppjb006 powershell[19393]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: aacec536-52c7-4cd5-b53c-2c3284d8bb64#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 11:59:39 vmfsppjb006 powershell[19393]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 19393 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 12:00:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:00:37 vmfsppjb006 dbus-daemon[19499]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:00:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:00:38 vmfsppjb006 setroubleshoot[19499]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:00:38 vmfsppjb006 setroubleshoot[19499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:00:38 vmfsppjb006 platform-python[19499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 19756 in AppDomain: None.
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: bac96ecd-4bac-4e7a-b423-38892c6a5150#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:05 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 6a5346f2-3989-42d4-a251-784f4eee6682#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb004 1 1#012        Engine Version = 7.1.4#012        Runspace ID = 4676d558-6e54-4760-ae99-e187981b108d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 12:05:18 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 12:05:18 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012Dc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 0cbc3992-fdfa-4fa1-b3f4-aa58e1dd54e1#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 12:05:18 vmfsppjb006 powershell[19756]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 63715e10-7d31-44aa-bcec-b09be1607877#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 12:05:23 vmfsppjb006 finsrvpf[19807]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ stop ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 12:05:23 vmfsppjb006 powershell[19756]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 19756 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 12:05:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:05:37 vmfsppjb006 dbus-daemon[19823]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:05:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:05:38 vmfsppjb006 setroubleshoot[19823]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:05:38 vmfsppjb006 setroubleshoot[19823]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:05:38 vmfsppjb006 platform-python[19823]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:06:43 vmfsppjb006 python3.6[1694]: 2021-10-28T03:06:43.719126Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 12:07:37 vmfsppjb006 python3.6[1694]: 2021-10-28T03:07:37.919612Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 6;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 12:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 12:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 12:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 12:09:01 vmfsppjb006 systemd[1]: Started Session 31 of user omsagent.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Reached target Paths.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Reached target Timers.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Starting D-Bus User Message Bus Socket.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Listening on D-Bus User Message Bus Socket.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Reached target Sockets.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Reached target Basic System.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Reached target Default.
Oct 28 12:09:01 vmfsppjb006 systemd[20018]: Startup finished in 46ms.
Oct 28 12:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 12:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Stopped target Default.
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Stopped target Basic System.
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Stopped target Sockets.
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Closed D-Bus User Message Bus Socket.
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Stopped target Timers.
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Stopped target Paths.
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Reached target Shutdown.
Oct 28 12:09:02 vmfsppjb006 systemd[20018]: Starting Exit the Session...
Oct 28 12:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 20060 (systemctl) with signal SIGKILL.
Oct 28 12:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 12:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 12:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 12:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 12:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:09:37 vmfsppjb006 dbus-daemon[20112]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:09:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:09:38 vmfsppjb006 setroubleshoot[20112]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:09:39 vmfsppjb006 setroubleshoot[20112]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:09:39 vmfsppjb006 platform-python[20112]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:10:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:10:37 vmfsppjb006 dbus-daemon[20171]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:10:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:10:38 vmfsppjb006 setroubleshoot[20171]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:10:38 vmfsppjb006 setroubleshoot[20171]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:10:38 vmfsppjb006 platform-python[20171]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:16:15 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 28 12:16:16 vmfsppjb006 dnf[20494]: packages-microsoft-com-prod                      11 kB/s | 3.0 kB     00:00
Oct 28 12:16:17 vmfsppjb006 dnf[20494]: packages-microsoft-com-prod                     7.2 MB/s | 6.2 MB     00:00
Oct 28 12:16:18 vmfsppjb006 dnf[20494]: MySQL 8.0 Community Server                      103 kB/s | 2.6 kB     00:00
Oct 28 12:16:18 vmfsppjb006 dnf[20494]: MySQL Connectors Community                      106 kB/s | 2.6 kB     00:00
Oct 28 12:16:18 vmfsppjb006 dnf[20494]: MySQL Tools Community                           210 kB/s | 2.6 kB     00:00
Oct 28 12:16:19 vmfsppjb006 dnf[20494]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.2 kB/s | 2.4 kB     00:00
Oct 28 12:16:20 vmfsppjb006 dnf[20494]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 4.9 kB/s | 2.8 kB     00:00
Oct 28 12:16:21 vmfsppjb006 dnf[20494]: Microsoft Azure RPMs for RHEL8 Extended Update  7.1 kB/s | 2.1 kB     00:00
Oct 28 12:16:21 vmfsppjb006 dnf[20494]: Zabbix Official Repository - x86_64              12 kB/s | 2.9 kB     00:00
Oct 28 12:16:21 vmfsppjb006 dnf[20494]: Zabbix Official Repository non-supported - x86_  12 kB/s | 3.0 kB     00:00
Oct 28 12:16:22 vmfsppjb006 dnf[20494]: Metadata cache created.
Oct 28 12:16:22 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 28 12:16:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:16:37 vmfsppjb006 dbus-daemon[20540]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:16:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:16:38 vmfsppjb006 setroubleshoot[20540]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:16:39 vmfsppjb006 setroubleshoot[20540]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:16:39 vmfsppjb006 platform-python[20540]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:19:29 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 12:19:30 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 12:19:30 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 12:20:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:20:37 vmfsppjb006 dbus-daemon[20848]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:20:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:20:38 vmfsppjb006 setroubleshoot[20848]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:20:39 vmfsppjb006 setroubleshoot[20848]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:20:39 vmfsppjb006 platform-python[20848]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Started Session 33 of user omsagent.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Reached target Paths.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Starting D-Bus User Message Bus Socket.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Reached target Timers.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Listening on D-Bus User Message Bus Socket.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Reached target Sockets.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Reached target Basic System.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Reached target Default.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Startup finished in 46ms.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Stopped target Default.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Stopped target Basic System.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Stopped target Paths.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Stopped target Sockets.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Stopped target Timers.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Closed D-Bus User Message Bus Socket.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Reached target Shutdown.
Oct 28 12:24:01 vmfsppjb006 systemd[21035]: Starting Exit the Session...
Oct 28 12:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 21077 (systemctl) with signal SIGKILL.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 12:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 12:24:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:24:37 vmfsppjb006 dbus-daemon[21131]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:24:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:24:38 vmfsppjb006 setroubleshoot[21131]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:24:39 vmfsppjb006 setroubleshoot[21131]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:24:39 vmfsppjb006 platform-python[21131]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:25:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:25:37 vmfsppjb006 dbus-daemon[21191]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:25:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:25:38 vmfsppjb006 setroubleshoot[21191]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:25:39 vmfsppjb006 setroubleshoot[21191]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:25:39 vmfsppjb006 platform-python[21191]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:30:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:30:37 vmfsppjb006 dbus-daemon[21481]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:30:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:30:38 vmfsppjb006 setroubleshoot[21481]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:30:39 vmfsppjb006 setroubleshoot[21481]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:30:39 vmfsppjb006 platform-python[21481]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:37:43 vmfsppjb006 python3.6[1694]: 2021-10-28T03:37:43.926148Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 7;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 12:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 12:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 12:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 12:39:01 vmfsppjb006 systemd[1]: Started Session 35 of user omsagent.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Reached target Timers.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Reached target Paths.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Starting D-Bus User Message Bus Socket.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Listening on D-Bus User Message Bus Socket.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Reached target Sockets.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Reached target Basic System.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Reached target Default.
Oct 28 12:39:01 vmfsppjb006 systemd[21962]: Startup finished in 44ms.
Oct 28 12:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 12:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Stopped target Default.
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Stopped target Basic System.
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Stopped target Sockets.
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Closed D-Bus User Message Bus Socket.
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Stopped target Timers.
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Stopped target Paths.
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Reached target Shutdown.
Oct 28 12:39:02 vmfsppjb006 systemd[21962]: Starting Exit the Session...
Oct 28 12:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 22004 (systemctl) with signal SIGKILL.
Oct 28 12:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 12:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 12:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 12:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 12:39:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:39:37 vmfsppjb006 dbus-daemon[22055]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:39:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:39:38 vmfsppjb006 setroubleshoot[22055]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:39:39 vmfsppjb006 setroubleshoot[22055]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:39:39 vmfsppjb006 platform-python[22055]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:43:32 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 12:43:33 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 12:43:33 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 12:43:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:43:37 vmfsppjb006 dbus-daemon[22364]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:43:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:43:38 vmfsppjb006 setroubleshoot[22364]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:43:39 vmfsppjb006 setroubleshoot[22364]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:43:39 vmfsppjb006 platform-python[22364]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 12:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 12:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 12:54:01 vmfsppjb006 systemd[1]: Started Session 37 of user omsagent.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Starting D-Bus User Message Bus Socket.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Reached target Paths.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Reached target Timers.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Listening on D-Bus User Message Bus Socket.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Reached target Sockets.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Reached target Basic System.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Reached target Default.
Oct 28 12:54:01 vmfsppjb006 systemd[22958]: Startup finished in 45ms.
Oct 28 12:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 12:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:54:03 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Stopped target Default.
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Stopped target Basic System.
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Stopped target Timers.
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Stopped target Paths.
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Stopped target Sockets.
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Closed D-Bus User Message Bus Socket.
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Reached target Shutdown.
Oct 28 12:54:03 vmfsppjb006 systemd[22958]: Starting Exit the Session...
Oct 28 12:54:03 vmfsppjb006 systemd[1]: user@986.service: Killing process 23000 (systemctl) with signal SIGKILL.
Oct 28 12:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:54:03 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 12:54:03 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 12:54:03 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 12:54:03 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 12:54:03 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 12:54:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:54:37 vmfsppjb006 dbus-daemon[23043]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:54:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:54:37 vmfsppjb006 setroubleshoot[23043]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:54:38 vmfsppjb006 setroubleshoot[23043]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:54:38 vmfsppjb006 platform-python[23043]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 12:56:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 12:56:37 vmfsppjb006 dbus-daemon[23157]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 12:56:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 12:56:37 vmfsppjb006 setroubleshoot[23157]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 12:56:38 vmfsppjb006 setroubleshoot[23157]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 12:56:38 vmfsppjb006 platform-python[23157]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:06:49 vmfsppjb006 python3.6[1694]: 2021-10-28T04:06:49.340972Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 13:07:35 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 13:07:36 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 13:07:36 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 13:07:49 vmfsppjb006 python3.6[1694]: 2021-10-28T04:07:49.537750Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 8;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 13:08:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:08:37 vmfsppjb006 dbus-daemon[23929]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:08:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:08:38 vmfsppjb006 setroubleshoot[23929]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:08:38 vmfsppjb006 setroubleshoot[23929]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:08:38 vmfsppjb006 platform-python[23929]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 13:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 13:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 13:09:01 vmfsppjb006 systemd[1]: Started Session 39 of user omsagent.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Reached target Paths.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Reached target Timers.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Starting D-Bus User Message Bus Socket.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Listening on D-Bus User Message Bus Socket.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Reached target Sockets.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Reached target Basic System.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Reached target Default.
Oct 28 13:09:01 vmfsppjb006 systemd[23965]: Startup finished in 45ms.
Oct 28 13:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Stopped target Default.
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Stopped target Basic System.
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Stopped target Paths.
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Stopped target Sockets.
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Closed D-Bus User Message Bus Socket.
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Reached target Shutdown.
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Starting Exit the Session...
Oct 28 13:09:02 vmfsppjb006 systemd[23965]: Stopped target Timers.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 24007 (systemctl) with signal SIGKILL.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 13:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 13:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 13:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:09:37 vmfsppjb006 dbus-daemon[24051]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:09:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:09:38 vmfsppjb006 setroubleshoot[24051]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:09:38 vmfsppjb006 setroubleshoot[24051]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:09:38 vmfsppjb006 platform-python[24051]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:10:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:10:37 vmfsppjb006 dbus-daemon[24117]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:10:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:10:38 vmfsppjb006 setroubleshoot[24117]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:10:38 vmfsppjb006 setroubleshoot[24117]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:10:38 vmfsppjb006 platform-python[24117]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:15:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:15:37 vmfsppjb006 dbus-daemon[24411]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:15:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:15:38 vmfsppjb006 setroubleshoot[24411]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:15:38 vmfsppjb006 setroubleshoot[24411]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:15:38 vmfsppjb006 platform-python[24411]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:16:29 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 28 13:16:29 vmfsppjb006 dnf[24459]: Metadata cache refreshed recently.
Oct 28 13:16:29 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 28 13:21:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:21:37 vmfsppjb006 dbus-daemon[24748]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:21:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:21:38 vmfsppjb006 setroubleshoot[24748]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:21:38 vmfsppjb006 setroubleshoot[24748]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:21:38 vmfsppjb006 platform-python[24748]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Started Session 41 of user omsagent.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Reached target Timers.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Reached target Paths.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Starting D-Bus User Message Bus Socket.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Listening on D-Bus User Message Bus Socket.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Reached target Sockets.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Reached target Basic System.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Reached target Default.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Startup finished in 48ms.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Stopped target Default.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Stopped target Basic System.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Stopped target Timers.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Stopped target Sockets.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Closed D-Bus User Message Bus Socket.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Stopped target Paths.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Reached target Shutdown.
Oct 28 13:24:01 vmfsppjb006 systemd[24891]: Starting Exit the Session...
Oct 28 13:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 24933 (systemctl) with signal SIGKILL.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 13:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 13:24:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:24:37 vmfsppjb006 dbus-daemon[24977]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:24:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:24:38 vmfsppjb006 setroubleshoot[24977]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:24:38 vmfsppjb006 setroubleshoot[24977]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:24:38 vmfsppjb006 platform-python[24977]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:31:37 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 13:31:38 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 13:31:38 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 13:32:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:32:37 vmfsppjb006 dbus-daemon[25514]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:32:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:32:38 vmfsppjb006 setroubleshoot[25514]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:32:39 vmfsppjb006 setroubleshoot[25514]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:32:39 vmfsppjb006 platform-python[25514]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:37:55 vmfsppjb006 python3.6[1694]: 2021-10-28T04:37:55.066237Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 9;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Started Session 43 of user omsagent.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Reached target Paths.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Starting D-Bus User Message Bus Socket.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Reached target Timers.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Listening on D-Bus User Message Bus Socket.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Reached target Sockets.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Reached target Basic System.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Reached target Default.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Startup finished in 50ms.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Stopped target Default.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Stopped target Basic System.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Stopped target Sockets.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Closed D-Bus User Message Bus Socket.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Stopped target Timers.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Stopped target Paths.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Reached target Shutdown.
Oct 28 13:39:01 vmfsppjb006 systemd[25890]: Starting Exit the Session...
Oct 28 13:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 25932 (systemctl) with signal SIGKILL.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 13:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 13:39:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:39:37 vmfsppjb006 dbus-daemon[25972]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:39:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:39:38 vmfsppjb006 setroubleshoot[25972]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:39:39 vmfsppjb006 setroubleshoot[25972]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:39:39 vmfsppjb006 platform-python[25972]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:42:32 vmfsppjb006 powershell[26143]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 13:42:32 vmfsppjb006 powershell[26143]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 26143 in AppDomain: None.
Oct 28 13:42:32 vmfsppjb006 powershell[26143]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 13:42:32 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 13:42:32 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 6afa01ba-8fb2-4e48-8fc8-7a72204151b6#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:33 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 4576847d-fefb-4a44-99b7-3fc06877ebd4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb005 1 3#012        Engine Version = 7.1.4#012        Runspace ID = 4769f7fe-acf9-4fc6-bbaf-0d095c9e7e4d#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:42:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:42:37 vmfsppjb006 dbus-daemon[26175]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:42:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:42:38 vmfsppjb006 setroubleshoot[26175]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:42:39 vmfsppjb006 setroubleshoot[26175]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:42:39 vmfsppjb006 platform-python[26175]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:42:45 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 13:42:45 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMz
Oct 28 13:42:45 vmfsppjb006 powershell[26143]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 4f726b37-32f5-4086-b2f0-2817157fe8a8#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:42:54 vmfsppjb006 finsrvpf[26208]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb005 ]
Oct 28 13:42:54 vmfsppjb006 powershell[26143]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 26143 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 13:43:14 vmfsppjb006 powershell[26225]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 26225 in AppDomain: None.
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: f2439a34-874a-4985-a4c5-c46d7ad5be08#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:15 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = b9650a33-b20f-4951-80ba-149a9b008770#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb011 1 5#012        Engine Version = 7.1.4#012        Runspace ID = 345020c0-f897-4668-86e0-316c4dda31e6#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:43:27 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 13:43:27 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012QYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoY
Oct 28 13:43:27 vmfsppjb006 powershell[26225]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 33a8db4b-ce99-41b2-ba5b-86486cecf339#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:43:38 vmfsppjb006 finsrvpf[26269]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb011 ]
Oct 28 13:43:38 vmfsppjb006 powershell[26225]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 26225 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 13:44:29 vmfsppjb006 powershell[26336]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 13:44:29 vmfsppjb006 powershell[26336]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 26336 in AppDomain: None.
Oct 28 13:44:29 vmfsppjb006 powershell[26336]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 868eb9a7-6f2e-4987-bb61-629c638dde5a#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:30 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = ddf9c3fa-e495-4e3b-b3a2-1cffe7f51f2e#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb005 2 1#012        Engine Version = 7.1.4#012        Runspace ID = 19db6a8e-f225-4dfe-b2d5-c20e987715af#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:44:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:44:37 vmfsppjb006 dbus-daemon[26359]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:44:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:44:38 vmfsppjb006 setroubleshoot[26359]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:44:39 vmfsppjb006 setroubleshoot[26359]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:44:39 vmfsppjb006 platform-python[26359]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:44:42 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 13:44:42 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012XJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 9e8c5630-24bb-4579-bea0-a8de81bf1182#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:44:42 vmfsppjb006 powershell[26336]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 969260f4-0a13-432c-9c5d-abc23b8a3440#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:44:49 vmfsppjb006 finsrvpf[26389]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ stop ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb005 ]
Oct 28 13:44:49 vmfsppjb006 powershell[26336]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 26336 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 13:46:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:46:37 vmfsppjb006 dbus-daemon[26488]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:46:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:46:38 vmfsppjb006 setroubleshoot[26488]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:46:39 vmfsppjb006 powershell[26498]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 13:46:39 vmfsppjb006 powershell[26498]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 26498 in AppDomain: None.
Oct 28 13:46:39 vmfsppjb006 powershell[26498]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 13:46:39 vmfsppjb006 setroubleshoot[26488]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:46:39 vmfsppjb006 platform-python[26488]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:46:39 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 13:46:39 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 0dcea2ab-37cc-4271-a5c3-e8e834a49cec#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:40 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 325add1b-441d-4df5-9238-9984ced202ae#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = f1a76462-7377-4ece-9a8c-ca4b9889a5ac#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:46:53 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 13:46:53 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012vz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 43e700e0-02d9-46c9-9966-6657e2dc6479#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:46:53 vmfsppjb006 powershell[26498]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 50093ef6-3092-4648-b22c-2a93d29d24ad#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:47:05 vmfsppjb006 finsrvpf[26555]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ stop ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb011 ]
Oct 28 13:47:05 vmfsppjb006 powershell[26498]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 26498 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 13:47:45 vmfsppjb006 powershell[26599]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 13:47:45 vmfsppjb006 powershell[26599]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 26599 in AppDomain: None.
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: aa8244c2-40a0-4597-925e-506745d7e314#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:46 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 81fcbdf1-258f-4145-b956-98b314ca5533#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 stop rg-finsrvpf-prod-001 vmfsppjb011 2 3#012        Engine Version = 7.1.4#012        Runspace ID = e5c1e0e6-c699-4039-b238-70f87ba39eb1#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 13:47:58 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 13:47:58 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012hIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 1a8de583-8c8a-4db9-810b-ba499d529dad#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:47:58 vmfsppjb006 powershell[26599]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 96f1a151-8410-4b19-82c7-c5871c85616c#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 13:48:00 vmfsppjb006 powershell[26599]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 26599 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 13:48:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:48:37 vmfsppjb006 dbus-daemon[26660]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:48:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:48:38 vmfsppjb006 setroubleshoot[26660]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:48:39 vmfsppjb006 setroubleshoot[26660]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:48:39 vmfsppjb006 platform-python[26660]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:51:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:51:37 vmfsppjb006 dbus-daemon[26836]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:51:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:51:38 vmfsppjb006 setroubleshoot[26836]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:51:39 vmfsppjb006 setroubleshoot[26836]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:51:39 vmfsppjb006 platform-python[26836]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 13:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 13:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 13:54:01 vmfsppjb006 systemd[1]: Started Session 45 of user omsagent.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Reached target Paths.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Starting D-Bus User Message Bus Socket.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Reached target Timers.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Listening on D-Bus User Message Bus Socket.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Reached target Sockets.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Reached target Basic System.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Reached target Default.
Oct 28 13:54:01 vmfsppjb006 systemd[26988]: Startup finished in 44ms.
Oct 28 13:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 13:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Stopped target Default.
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Stopped target Basic System.
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Stopped target Sockets.
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Closed D-Bus User Message Bus Socket.
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Stopped target Timers.
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Stopped target Paths.
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Reached target Shutdown.
Oct 28 13:54:02 vmfsppjb006 systemd[26988]: Starting Exit the Session...
Oct 28 13:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 27030 (systemctl) with signal SIGKILL.
Oct 28 13:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 13:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 13:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 13:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 13:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 13:54:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:54:37 vmfsppjb006 dbus-daemon[27079]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:54:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:54:38 vmfsppjb006 setroubleshoot[27079]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:54:39 vmfsppjb006 setroubleshoot[27079]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:54:39 vmfsppjb006 platform-python[27079]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 13:55:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 13:55:37 vmfsppjb006 dbus-daemon[27134]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 13:55:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 13:55:38 vmfsppjb006 setroubleshoot[27134]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 13:55:39 vmfsppjb006 setroubleshoot[27134]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 13:55:39 vmfsppjb006 platform-python[27134]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:01:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:01:37 vmfsppjb006 dbus-daemon[27491]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:01:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:01:37 vmfsppjb006 setroubleshoot[27491]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:01:38 vmfsppjb006 setroubleshoot[27491]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:01:38 vmfsppjb006 platform-python[27491]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Started /run/user/0 mount wrapper.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Created slice User Slice of UID 0.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Starting User Manager for UID 0...
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Started Session c2 of user root.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Starting D-Bus User Message Bus Socket.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Reached target Paths.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Reached target Timers.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Listening on D-Bus User Message Bus Socket.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Reached target Sockets.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Reached target Basic System.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Reached target Default.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Startup finished in 46ms.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Started User Manager for UID 0.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Stopping User Manager for UID 0...
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Stopped target Default.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Stopped target Basic System.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Stopped target Timers.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Stopped target Sockets.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Closed D-Bus User Message Bus Socket.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Stopped target Paths.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Reached target Shutdown.
Oct 28 14:01:41 vmfsppjb006 systemd[27586]: Starting Exit the Session...
Oct 28 14:01:41 vmfsppjb006 systemd[1]: user@0.service: Killing process 27621 (systemctl) with signal SIGKILL.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Stopped User Manager for UID 0.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: user-runtime-dir@0.service: Unit not needed anymore. Stopping.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Stopping /run/user/0 mount wrapper...
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 0.
Oct 28 14:01:41 vmfsppjb006 systemd[1]: Stopped /run/user/0 mount wrapper.
Oct 28 14:02:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:02:37 vmfsppjb006 dbus-daemon[27682]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:02:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:02:37 vmfsppjb006 setroubleshoot[27682]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:02:38 vmfsppjb006 setroubleshoot[27682]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:02:38 vmfsppjb006 platform-python[27682]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:03:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:03:37 vmfsppjb006 dbus-daemon[27740]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:03:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:03:37 vmfsppjb006 setroubleshoot[27740]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:03:38 vmfsppjb006 setroubleshoot[27740]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:03:38 vmfsppjb006 platform-python[27740]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:05:42 vmfsppjb006 systemd[1]: Started Session 48 of user finsrvpf.
Oct 28 14:05:42 vmfsppjb006 systemd-logind[943]: New session 48 of user finsrvpf.
Oct 28 14:05:46 vmfsppjb006 systemd-logind[943]: Session 48 logged out. Waiting for processes to exit.
Oct 28 14:05:46 vmfsppjb006 systemd-logind[943]: Removed session 48.
Oct 28 14:06:02 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 28 14:06:02 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 28 14:06:02 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 28 14:06:02 vmfsppjb006 systemd[1]: Started Session 49 of user jobuser.
Oct 28 14:06:02 vmfsppjb006 systemd-logind[943]: New session 49 of user jobuser.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Starting D-Bus User Message Bus Socket.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Reached target Paths.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Reached target Timers.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Listening on D-Bus User Message Bus Socket.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Reached target Sockets.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Reached target Basic System.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Reached target Default.
Oct 28 14:06:02 vmfsppjb006 systemd[27921]: Startup finished in 46ms.
Oct 28 14:06:02 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 28 14:06:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:06:37 vmfsppjb006 dbus-daemon[27992]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:06:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:06:37 vmfsppjb006 setroubleshoot[27992]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:06:38 vmfsppjb006 setroubleshoot[27992]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:06:38 vmfsppjb006 platform-python[27992]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:06:54 vmfsppjb006 python3.6[1694]: 2021-10-28T05:06:54.630352Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 14:07:22 vmfsppjb006 powershell[28045]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 14:07:22 vmfsppjb006 powershell[28045]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 28045 in AppDomain: None.
Oct 28 14:07:23 vmfsppjb006 powershell[28045]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 14:07:23 vmfsppjb006 jobuser[28062]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 14:07:23 vmfsppjb006 powershell[28045]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 28045 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 14:07:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:07:37 vmfsppjb006 dbus-daemon[28076]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:07:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:07:37 vmfsppjb006 setroubleshoot[28076]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:07:38 vmfsppjb006 setroubleshoot[28076]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:07:38 vmfsppjb006 platform-python[28076]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:08:00 vmfsppjb006 python3.6[1694]: 2021-10-28T05:08:00.920728Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 10;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 14:08:15 vmfsppjb006 systemd[27921]: Starting Mark boot as successful...
Oct 28 14:08:15 vmfsppjb006 systemd[27921]: Started Mark boot as successful.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Started Session 51 of user omsagent.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Reached target Timers.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Reached target Paths.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Starting D-Bus User Message Bus Socket.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Listening on D-Bus User Message Bus Socket.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Reached target Sockets.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Reached target Basic System.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Reached target Default.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Startup finished in 45ms.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Stopped target Default.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Stopped target Basic System.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Stopped target Timers.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Stopped target Paths.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Stopped target Sockets.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Closed D-Bus User Message Bus Socket.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Reached target Shutdown.
Oct 28 14:09:01 vmfsppjb006 systemd[28176]: Starting Exit the Session...
Oct 28 14:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 28222 (systemctl) with signal SIGKILL.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 14:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 14:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:09:37 vmfsppjb006 dbus-daemon[28262]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:09:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:09:38 vmfsppjb006 setroubleshoot[28262]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:09:38 vmfsppjb006 setroubleshoot[28262]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:09:38 vmfsppjb006 platform-python[28262]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:10:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:10:37 vmfsppjb006 dbus-daemon[28318]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:10:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:10:38 vmfsppjb006 setroubleshoot[28318]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:10:38 vmfsppjb006 setroubleshoot[28318]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:10:38 vmfsppjb006 platform-python[28318]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:16:32 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 28 14:16:33 vmfsppjb006 dnf[28670]: Metadata cache refreshed recently.
Oct 28 14:16:33 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 28 14:17:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:17:37 vmfsppjb006 dbus-daemon[28737]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:17:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:17:38 vmfsppjb006 setroubleshoot[28737]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:17:38 vmfsppjb006 setroubleshoot[28737]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:17:38 vmfsppjb006 platform-python[28737]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:19:41 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 14:19:42 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 14:19:42 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 14:21:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:21:37 vmfsppjb006 dbus-daemon[29046]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:21:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:21:38 vmfsppjb006 setroubleshoot[29046]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:21:38 vmfsppjb006 setroubleshoot[29046]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:21:38 vmfsppjb006 platform-python[29046]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:21:43 vmfsppjb006 systemd-logind[943]: Session 49 logged out. Waiting for processes to exit.
Oct 28 14:21:43 vmfsppjb006 systemd-logind[943]: Removed session 49.
Oct 28 14:21:43 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 14:21:43 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Stopped target Default.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Stopped target Basic System.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Stopped target Timers.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Stopped target Paths.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Stopped target Sockets.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Closed D-Bus User Message Bus Socket.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Reached target Shutdown.
Oct 28 14:21:43 vmfsppjb006 systemd[27921]: Starting Exit the Session...
Oct 28 14:21:43 vmfsppjb006 systemd[1]: user@1003.service: Killing process 29066 (systemctl) with signal SIGKILL.
Oct 28 14:21:43 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 14:21:43 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 28 14:21:43 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 14:21:43 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 28 14:21:43 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 28 14:21:43 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Started Session 53 of user omsagent.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Reached target Timers.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Reached target Paths.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Starting D-Bus User Message Bus Socket.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Listening on D-Bus User Message Bus Socket.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Reached target Sockets.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Reached target Basic System.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Reached target Default.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Startup finished in 46ms.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Stopped target Default.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Stopped target Basic System.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Stopped target Paths.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Stopped target Sockets.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Closed D-Bus User Message Bus Socket.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Reached target Shutdown.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Stopped target Timers.
Oct 28 14:24:01 vmfsppjb006 systemd[29200]: Starting Exit the Session...
Oct 28 14:24:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 29241 (systemctl) with signal SIGKILL.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 14:24:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 14:24:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:24:37 vmfsppjb006 dbus-daemon[29280]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:24:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:24:38 vmfsppjb006 setroubleshoot[29280]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:24:38 vmfsppjb006 setroubleshoot[29280]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:24:38 vmfsppjb006 platform-python[29280]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 29339 in AppDomain: None.
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 7a53fdef-4603-46b2-85e5-4c21cfdab205#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:24 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 64b41530-535a-4ff4-81ba-ed86e523a751#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 510c418d-9b3c-405c-9fe5-ae6d0eb5e3a4#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:25:37 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 14:25:37 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#0122lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DL
Oct 28 14:25:37 vmfsppjb006 powershell[29339]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 3455e1eb-f2fe-4226-8165-65699208a055#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:25:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:25:37 vmfsppjb006 dbus-daemon[29374]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:25:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:25:38 vmfsppjb006 setroubleshoot[29374]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:25:39 vmfsppjb006 setroubleshoot[29374]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:25:39 vmfsppjb006 platform-python[29374]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:27:25 vmfsppjb006 powershell[29487]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 14:27:25 vmfsppjb006 powershell[29487]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 29487 in AppDomain: None.
Oct 28 14:27:25 vmfsppjb006 powershell[29487]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: f5bf9123-c8c6-42df-8223-6c3ab3446be0#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:26 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d66c072f-9eda-4dc8-ac5d-16d9f4c6f51d#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8b19ee27-94cb-4452-b807-8699554323a2#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:27:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:27:37 vmfsppjb006 dbus-daemon[29523]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:27:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:27:38 vmfsppjb006 setroubleshoot[29523]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:27:38 vmfsppjb006 setroubleshoot[29523]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:27:38 vmfsppjb006 platform-python[29523]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:27:38 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 14:27:38 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012SqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: de4930d6-199d-4dfa-86ba-b0b065017c24#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:27:38 vmfsppjb006 powershell[29487]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 3c43aa25-b1fb-439a-b94c-322fb4ee85e4#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:27:41 vmfsppjb006 finsrvpf[29533]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 14:27:41 vmfsppjb006 powershell[29487]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 29487 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 14:30:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:30:37 vmfsppjb006 dbus-daemon[29700]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:30:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:30:38 vmfsppjb006 setroubleshoot[29700]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:30:38 vmfsppjb006 setroubleshoot[29700]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:30:38 vmfsppjb006 platform-python[29700]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:35:44 vmfsppjb006 powershell[29993]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 14:35:44 vmfsppjb006 powershell[29993]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 29993 in AppDomain: None.
Oct 28 14:35:44 vmfsppjb006 powershell[29993]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 98db855e-11d7-4dca-b65c-13a1085f1fae#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:45 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = dce365f9-404c-493e-9597-656733cbe913#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8ec6a581-b691-43b0-8d0b-d4e90d1c8ea3#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:35:57 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 14:35:57 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
Oct 28 14:35:57 vmfsppjb006 powershell[29993]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 40257930-0d6e-49e3-be08-c1961e73276d#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:35:59 vmfsppjb006 finsrvpf[30032]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 14:35:59 vmfsppjb006 powershell[29993]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 29993 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 14:36:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:36:37 vmfsppjb006 dbus-daemon[30071]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:36:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:36:38 vmfsppjb006 setroubleshoot[30071]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:36:39 vmfsppjb006 setroubleshoot[30071]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:36:39 vmfsppjb006 platform-python[30071]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:38:06 vmfsppjb006 python3.6[1694]: 2021-10-28T05:38:06.492308Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 11;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 14:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 14:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 14:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 14:39:01 vmfsppjb006 systemd[1]: Started Session 55 of user omsagent.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Reached target Paths.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Starting D-Bus User Message Bus Socket.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Reached target Timers.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Listening on D-Bus User Message Bus Socket.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Reached target Sockets.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Reached target Basic System.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Reached target Default.
Oct 28 14:39:01 vmfsppjb006 systemd[30221]: Startup finished in 47ms.
Oct 28 14:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 14:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:39:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Stopped target Default.
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Stopped target Basic System.
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Stopped target Timers.
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Stopped target Paths.
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Stopped target Sockets.
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Closed D-Bus User Message Bus Socket.
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Reached target Shutdown.
Oct 28 14:39:02 vmfsppjb006 systemd[30221]: Starting Exit the Session...
Oct 28 14:39:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 30263 (systemctl) with signal SIGKILL.
Oct 28 14:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:39:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 14:39:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:39:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 14:39:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 14:39:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 30304 in AppDomain: None.
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 61a7aae9-c73e-4f92-b4d1-da5fe77bfad2#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:34 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d6e0b528-0d9a-478a-9397-c2ca6eb479db#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2083ec82-a3fc-4b94-a970-4a0bdba1e64e#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:39:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:39:37 vmfsppjb006 dbus-daemon[30323]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:39:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:39:38 vmfsppjb006 setroubleshoot[30323]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:39:39 vmfsppjb006 setroubleshoot[30323]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:39:39 vmfsppjb006 platform-python[30323]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:39:46 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 14:39:46 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012CAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 08840ee9-337d-47f0-9843-da88490bc58b#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:39:46 vmfsppjb006 powershell[30304]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 0843eec3-1813-410b-a7ad-306e750de14d#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:40:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:40:37 vmfsppjb006 dbus-daemon[30413]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:40:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:40:38 vmfsppjb006 setroubleshoot[30413]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:40:39 vmfsppjb006 setroubleshoot[30413]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:40:39 vmfsppjb006 platform-python[30413]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:43:44 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 14:43:45 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 14:43:45 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 14:44:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:44:37 vmfsppjb006 dbus-daemon[30785]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:44:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:44:38 vmfsppjb006 setroubleshoot[30785]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:44:39 vmfsppjb006 setroubleshoot[30785]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:44:39 vmfsppjb006 platform-python[30785]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:45:22 vmfsppjb006 finsrvpf[30851]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 14:45:22 vmfsppjb006 powershell[30304]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 30304 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 14:47:10 vmfsppjb006 powershell[30957]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 14:47:10 vmfsppjb006 powershell[30957]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 30957 in AppDomain: None.
Oct 28 14:47:10 vmfsppjb006 powershell[30957]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 14:47:10 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 14:47:10 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 384fe8b8-816d-439f-a92a-d4ee2bfb6dd7#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:11 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = 429bc9c0-46ed-451b-8365-54811971bd12#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004 10 3#012        Engine Version = 7.1.4#012        Runspace ID = e261e616-0435-4907-aaf4-224802a66786#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 14:47:23 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 3):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 14:47:23 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 3):#012yK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p⏎⏎# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB⏎⏎# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# Bgk
Oct 28 14:47:23 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (3 of 3):#012wGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 567445ef-15b7-4a1e-92fd-51a42a697886#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:47:23 vmfsppjb006 powershell[30957]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: d7fa69c3-e88d-4c4a-8394-b942a12d07da#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 14:47:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:47:37 vmfsppjb006 dbus-daemon[31010]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:47:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:47:38 vmfsppjb006 setroubleshoot[31010]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:47:39 vmfsppjb006 setroubleshoot[31010]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:47:39 vmfsppjb006 platform-python[31010]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:48:08 vmfsppjb006 finsrvpf[31058]: VM Start/Stop Script is failed. Cause:[ Status check error ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjb004 ]
Oct 28 14:48:08 vmfsppjb006 powershell[30957]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 30957 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 14:50:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:50:37 vmfsppjb006 dbus-daemon[31205]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:50:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:50:38 vmfsppjb006 setroubleshoot[31205]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:50:39 vmfsppjb006 setroubleshoot[31205]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:50:39 vmfsppjb006 platform-python[31205]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Started Session 57 of user omsagent.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Starting D-Bus User Message Bus Socket.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Reached target Paths.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Reached target Timers.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Listening on D-Bus User Message Bus Socket.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Reached target Sockets.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Reached target Basic System.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Reached target Default.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Startup finished in 47ms.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Stopped target Default.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Stopped target Basic System.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Stopped target Paths.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Stopped target Timers.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Stopped target Sockets.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Closed D-Bus User Message Bus Socket.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Reached target Shutdown.
Oct 28 14:54:01 vmfsppjb006 systemd[31403]: Starting Exit the Session...
Oct 28 14:54:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 31445 (systemctl) with signal SIGKILL.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 14:54:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 14:54:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 14:54:37 vmfsppjb006 dbus-daemon[31484]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 14:54:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 14:54:38 vmfsppjb006 setroubleshoot[31484]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 14:54:39 vmfsppjb006 setroubleshoot[31484]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 14:54:39 vmfsppjb006 platform-python[31484]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:01:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:01:37 vmfsppjb006 dbus-daemon[31888]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:01:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:01:38 vmfsppjb006 setroubleshoot[31888]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:01:39 vmfsppjb006 setroubleshoot[31888]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:01:39 vmfsppjb006 platform-python[31888]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:06:59 vmfsppjb006 python3.6[1694]: 2021-10-28T06:06:59.717168Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 15:07:47 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 15:07:48 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 15:07:48 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 15:08:11 vmfsppjb006 python3.6[1694]: 2021-10-28T06:08:11.955299Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 12;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 15:08:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:08:37 vmfsppjb006 dbus-daemon[32372]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:08:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:08:37 vmfsppjb006 setroubleshoot[32372]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:08:38 vmfsppjb006 setroubleshoot[32372]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:08:38 vmfsppjb006 platform-python[32372]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 15:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 15:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 15:09:01 vmfsppjb006 systemd[1]: Started Session 59 of user omsagent.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Starting D-Bus User Message Bus Socket.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Reached target Paths.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Reached target Timers.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Listening on D-Bus User Message Bus Socket.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Reached target Sockets.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Reached target Basic System.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Reached target Default.
Oct 28 15:09:01 vmfsppjb006 systemd[32417]: Startup finished in 47ms.
Oct 28 15:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 15:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:09:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Stopped target Default.
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Stopped target Basic System.
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Stopped target Timers.
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Stopped target Paths.
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Stopped target Sockets.
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Closed D-Bus User Message Bus Socket.
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Reached target Shutdown.
Oct 28 15:09:02 vmfsppjb006 systemd[32417]: Starting Exit the Session...
Oct 28 15:09:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 32459 (systemctl) with signal SIGKILL.
Oct 28 15:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:09:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 15:09:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:09:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 15:09:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 15:09:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 15:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:09:37 vmfsppjb006 dbus-daemon[32499]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:09:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:09:37 vmfsppjb006 setroubleshoot[32499]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:09:38 vmfsppjb006 setroubleshoot[32499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:09:38 vmfsppjb006 platform-python[32499]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:10:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:10:37 vmfsppjb006 dbus-daemon[32565]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:10:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:10:37 vmfsppjb006 setroubleshoot[32565]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:10:38 vmfsppjb006 setroubleshoot[32565]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:10:38 vmfsppjb006 platform-python[32565]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 32723 in AppDomain: None.
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 35c0cbb0-41fb-41e9-acf1-f53e825aefd8#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:18 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d3916f5a-2908-46af-99b0-aa2adcee04a5#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 8126e4e0-a7f2-4887-97d3-b96ca76cd9e7#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:13:31 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 15:13:31 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012muF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: f0710f17-1cbc-482b-a45a-ae1cadde95ed#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 15:13:31 vmfsppjb006 powershell[32723]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 5e7f6fef-c20b-44ab-aa43-effc9723285f#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 15:13:32 vmfsppjb006 powershell[32723]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 32723 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 15:13:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:13:37 vmfsppjb006 dbus-daemon[32760]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:13:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:13:37 vmfsppjb006 setroubleshoot[32760]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:13:38 vmfsppjb006 setroubleshoot[32760]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:13:38 vmfsppjb006 platform-python[32760]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:15:05 vmfsppjb006 powershell[32869]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 15:15:05 vmfsppjb006 powershell[32869]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 32869 in AppDomain: None.
Oct 28 15:15:06 vmfsppjb006 powershell[32869]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 15:15:06 vmfsppjb006 finsrvpf[32886]: VM Start/Stop Script is failed. Cause:[ Argument error ], Operation:[ start ], ResourceGroupName:[  ], VirtualMachineName:[  ]
Oct 28 15:15:06 vmfsppjb006 powershell[32869]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 32869 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 15:15:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:15:37 vmfsppjb006 dbus-daemon[32913]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:15:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:15:37 vmfsppjb006 setroubleshoot[32913]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:15:38 vmfsppjb006 setroubleshoot[32913]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:15:38 vmfsppjb006 platform-python[32913]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:16:36 vmfsppjb006 systemd[1]: Starting dnf makecache...
Oct 28 15:16:37 vmfsppjb006 dnf[32965]: packages-microsoft-com-prod                      13 kB/s | 3.0 kB     00:00
Oct 28 15:16:37 vmfsppjb006 dnf[32965]: MySQL 8.0 Community Server                      118 kB/s | 2.6 kB     00:00
Oct 28 15:16:37 vmfsppjb006 dnf[32965]: MySQL Connectors Community                      137 kB/s | 2.6 kB     00:00
Oct 28 15:16:37 vmfsppjb006 dnf[32965]: MySQL Tools Community                           190 kB/s | 2.6 kB     00:00
Oct 28 15:16:37 vmfsppjb006 dnf[32965]: Red Hat Enterprise Linux 8 for x86_64 - BaseOS  4.2 kB/s | 2.4 kB     00:00
Oct 28 15:16:38 vmfsppjb006 dnf[32965]: Red Hat Enterprise Linux 8 for x86_64 - AppStre 3.8 kB/s | 2.8 kB     00:00
Oct 28 15:16:39 vmfsppjb006 dnf[32965]: Microsoft Azure RPMs for RHEL8 Extended Update  5.2 kB/s | 2.1 kB     00:00
Oct 28 15:16:39 vmfsppjb006 dnf[32965]: Zabbix Official Repository - x86_64              11 kB/s | 2.9 kB     00:00
Oct 28 15:16:39 vmfsppjb006 dnf[32965]: Zabbix Official Repository non-supported - x86_  14 kB/s | 3.0 kB     00:00
Oct 28 15:16:40 vmfsppjb006 dnf[32965]: Metadata cache created.
Oct 28 15:16:40 vmfsppjb006 systemd[1]: Started dnf makecache.
Oct 28 15:17:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:17:37 vmfsppjb006 dbus-daemon[33039]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:17:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:17:38 vmfsppjb006 setroubleshoot[33039]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:17:38 vmfsppjb006 setroubleshoot[33039]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:17:38 vmfsppjb006 platform-python[33039]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:24:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 15:24:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 15:24:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 15:24:01 vmfsppjb006 systemd[1]: Started Session 61 of user omsagent.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Reached target Paths.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Starting D-Bus User Message Bus Socket.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Reached target Timers.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Listening on D-Bus User Message Bus Socket.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Reached target Sockets.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Reached target Basic System.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Reached target Default.
Oct 28 15:24:01 vmfsppjb006 systemd[33401]: Startup finished in 46ms.
Oct 28 15:24:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 15:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:24:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Stopped target Default.
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Stopped target Basic System.
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Stopped target Sockets.
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Closed D-Bus User Message Bus Socket.
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Stopped target Timers.
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Stopped target Paths.
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Reached target Shutdown.
Oct 28 15:24:02 vmfsppjb006 systemd[33401]: Starting Exit the Session...
Oct 28 15:24:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 33444 (systemctl) with signal SIGKILL.
Oct 28 15:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:24:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 15:24:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:24:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 15:24:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 15:24:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 15:24:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:24:37 vmfsppjb006 dbus-daemon[33485]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:24:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:24:38 vmfsppjb006 setroubleshoot[33485]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:24:38 vmfsppjb006 setroubleshoot[33485]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:24:38 vmfsppjb006 platform-python[33485]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:30:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:30:37 vmfsppjb006 dbus-daemon[33913]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:30:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:30:38 vmfsppjb006 setroubleshoot[33913]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:30:38 vmfsppjb006 setroubleshoot[33913]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:30:38 vmfsppjb006 platform-python[33913]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:30:52 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 28 15:30:52 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 28 15:30:52 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 28 15:30:52 vmfsppjb006 systemd[1]: Started Session 63 of user jobuser.
Oct 28 15:30:52 vmfsppjb006 systemd-logind[943]: New session 63 of user jobuser.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Reached target Paths.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Starting D-Bus User Message Bus Socket.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Reached target Timers.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Listening on D-Bus User Message Bus Socket.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Reached target Sockets.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Reached target Basic System.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Reached target Default.
Oct 28 15:30:52 vmfsppjb006 systemd[33948]: Startup finished in 51ms.
Oct 28 15:30:52 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 28 15:30:52 vmfsppjb006 powershell[33974]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 15:30:52 vmfsppjb006 powershell[33974]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 33974 in AppDomain: None.
Oct 28 15:30:52 vmfsppjb006 powershell[33974]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 15:30:52 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 9b079b76-9df0-438f-9ebd-879e57888dbc#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:30:53 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = d773fff8-ef4d-4e13-96c5-dff395a280a4#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjb004#012        Engine Version = 7.1.4#012        Runspace ID = 2998abdb-c646-472a-b21e-01b955f53977#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:31:07 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 15:31:07 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012iU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 597f4383-6f95-4da9-bc56-f7c2cb2091ac#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 15:31:07 vmfsppjb006 powershell[33974]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: c8429e2c-2ec1-426d-b271-d20a38bd195d#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 15:31:30 vmfsppjb006 systemd-logind[943]: Session 63 logged out. Waiting for processes to exit.
Oct 28 15:31:30 vmfsppjb006 systemd-logind[943]: Removed session 63.
Oct 28 15:31:30 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 15:31:30 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Stopped target Default.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Stopped target Basic System.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Stopped target Sockets.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Stopped target Paths.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Closed D-Bus User Message Bus Socket.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Stopped target Timers.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Reached target Shutdown.
Oct 28 15:31:30 vmfsppjb006 systemd[33948]: Starting Exit the Session...
Oct 28 15:31:30 vmfsppjb006 systemd[1]: user@1003.service: Killing process 34031 (systemctl) with signal SIGKILL.
Oct 28 15:31:30 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 15:31:30 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 28 15:31:30 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 15:31:30 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 28 15:31:30 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 28 15:31:30 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 28 15:31:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:31:37 vmfsppjb006 dbus-daemon[34050]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:31:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:31:38 vmfsppjb006 setroubleshoot[34050]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:31:38 vmfsppjb006 setroubleshoot[34050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:31:38 vmfsppjb006 platform-python[34050]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:31:50 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 15:31:51 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 15:31:51 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 15:32:30 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 28 15:32:30 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 28 15:32:30 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 28 15:32:30 vmfsppjb006 systemd[1]: Started Session 65 of user jobuser.
Oct 28 15:32:30 vmfsppjb006 systemd-logind[943]: New session 65 of user jobuser.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Reached target Paths.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Starting D-Bus User Message Bus Socket.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Reached target Timers.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Listening on D-Bus User Message Bus Socket.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Reached target Sockets.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Reached target Basic System.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Reached target Default.
Oct 28 15:32:30 vmfsppjb006 systemd[34189]: Startup finished in 44ms.
Oct 28 15:32:30 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 28 15:32:30 vmfsppjb006 powershell[34215]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 15:32:30 vmfsppjb006 powershell[34215]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 34215 in AppDomain: None.
Oct 28 15:32:30 vmfsppjb006 powershell[34215]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 15:32:30 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 15debe3b-9025-4e97-81ac-9fefc1a16d8b#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:31 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = e961cd08-64c7-4137-9d83-501e79594761#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = 62de444b-1b4b-4537-91f7-18b25f0db3ad#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 15:32:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:32:37 vmfsppjb006 dbus-daemon[34234]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:32:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:32:38 vmfsppjb006 setroubleshoot[34234]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:32:39 vmfsppjb006 setroubleshoot[34234]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:32:39 vmfsppjb006 platform-python[34234]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:32:43 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 15:32:43 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#0127AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt⏎⏎# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAWAHIPCSSNq+6wAAAAABYDANBglghkgBZQME⏎⏎# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ⏎⏎# BDEiBCCWIFamV80hMwySz5TO8ibSSDGM7ngLgqq0T7YBxsMRFjCB+gYLKoZIhvcN⏎⏎# AQkQAi8xgeowgecwgeQwgb0EIAISo72jcy6XW0Wnrx7qK8p+ldL/j1wXCeJeSPeo⏎⏎# sGW5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x⏎⏎# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv⏎⏎# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFg⏎⏎# ByDwkkjavusAAAAAAWAwIgQgJRDpPY98TQjeffzFoTykVmPGgrHYzGLeHH5vr1QI⏎⏎# jy0wDQYJKoZIhvcNAQELBQAEggEAFxCXA02uiRiuBq7S6z4TdeMqnfURyIimaQcy⏎⏎# pkhh7XN5ew5xYGS+AfDIvzFBW/S2BQmenHzIt8cjY/xaL+JrDbUhOD5K0MfIE3nI⏎⏎# gK0FJeS1knwW1bqycBqw1RUsVR99HkmbXT4h/lBf4jsehsWR5QdjzwPJ4+hry99r⏎⏎# qvxUT6OJe8ZmYWBdWi6nJFGc4FjekqVR998Rqt2bIU08lC/ayu/ER+JLxwz3TVa/⏎⏎# /sdSaB7c9EBZto0peZf73pyc8QML/Y0+Entm5eki4UP3vvEwwYqaKMc4MFYQvYBs⏎⏎# 2DLDSv9hv7NdzjekTA165Lo9K/OuYiw3UwVVZghO46FxCO0TXw==⏎⏎# SIG # End signature block⏎⏎#012#012ScriptBlock ID: 76d82a06-0deb-479f-ba98-dc2cd8e54bc2#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 15:32:43 vmfsppjb006 powershell[34215]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 51d5accf-1c69-436a-89f0-89560b274cad#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 15:32:44 vmfsppjb006 jobuser[34260]: VM Start/Stop Script is failed. Cause:[ Command failed ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjbxxx ]
Oct 28 15:32:44 vmfsppjb006 systemd-logind[943]: Session 65 logged out. Waiting for processes to exit.
Oct 28 15:32:44 vmfsppjb006 systemd-logind[943]: Removed session 65.
Oct 28 15:32:44 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 15:32:44 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Stopped target Default.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Stopped target Basic System.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Stopped target Timers.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Stopped target Paths.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Stopped target Sockets.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Closed D-Bus User Message Bus Socket.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Reached target Shutdown.
Oct 28 15:32:44 vmfsppjb006 systemd[34189]: Starting Exit the Session...
Oct 28 15:32:44 vmfsppjb006 systemd[1]: user@1003.service: Killing process 34262 (systemctl) with signal SIGKILL.
Oct 28 15:32:44 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 15:32:44 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 28 15:32:44 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 15:32:44 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 28 15:32:44 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 28 15:32:44 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 28 15:33:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:33:37 vmfsppjb006 dbus-daemon[34319]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:33:37 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:33:38 vmfsppjb006 setroubleshoot[34319]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:33:38 vmfsppjb006 setroubleshoot[34319]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:33:38 vmfsppjb006 platform-python[34319]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:38:17 vmfsppjb006 python3.6[1694]: 2021-10-28T06:38:17.791311Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 13;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Started Session 67 of user omsagent.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Reached target Paths.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Reached target Timers.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Starting D-Bus User Message Bus Socket.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Listening on D-Bus User Message Bus Socket.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Reached target Sockets.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Reached target Basic System.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Reached target Default.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Startup finished in 47ms.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Stopped target Default.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Stopped target Basic System.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Stopped target Timers.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Stopped target Paths.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Stopped target Sockets.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Closed D-Bus User Message Bus Socket.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Reached target Shutdown.
Oct 28 15:39:01 vmfsppjb006 systemd[34632]: Starting Exit the Session...
Oct 28 15:39:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 34675 (systemctl) with signal SIGKILL.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 15:39:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 15:39:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:39:37 vmfsppjb006 dbus-daemon[34724]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:39:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:39:38 vmfsppjb006 setroubleshoot[34724]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:39:38 vmfsppjb006 setroubleshoot[34724]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:39:38 vmfsppjb006 platform-python[34724]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:41:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:41:37 vmfsppjb006 dbus-daemon[34833]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:41:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:41:38 vmfsppjb006 setroubleshoot[34833]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:41:39 vmfsppjb006 setroubleshoot[34833]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:41:39 vmfsppjb006 platform-python[34833]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:54:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 15:54:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 15:54:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 15:54:01 vmfsppjb006 systemd[1]: Started Session 69 of user omsagent.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Reached target Timers.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Starting D-Bus User Message Bus Socket.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Reached target Paths.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Listening on D-Bus User Message Bus Socket.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Reached target Sockets.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Reached target Basic System.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Reached target Default.
Oct 28 15:54:01 vmfsppjb006 systemd[35550]: Startup finished in 49ms.
Oct 28 15:54:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 15:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:54:02 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Stopped target Default.
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Stopped target Basic System.
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Stopped target Paths.
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Stopped target Timers.
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Stopped target Sockets.
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Closed D-Bus User Message Bus Socket.
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Reached target Shutdown.
Oct 28 15:54:02 vmfsppjb006 systemd[35550]: Starting Exit the Session...
Oct 28 15:54:02 vmfsppjb006 systemd[1]: user@986.service: Killing process 35592 (systemctl) with signal SIGKILL.
Oct 28 15:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:54:02 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 15:54:02 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 15:54:02 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 15:54:02 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 15:54:02 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 15:54:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:54:37 vmfsppjb006 dbus-daemon[35632]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:54:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:54:38 vmfsppjb006 setroubleshoot[35632]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:54:39 vmfsppjb006 setroubleshoot[35632]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:54:39 vmfsppjb006 platform-python[35632]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 15:55:52 vmfsppjb006 systemd[1]: Stopping Operations Management Suite agent...
Oct 28 15:55:53 vmfsppjb006 systemd[1]: Stopped Operations Management Suite agent.
Oct 28 15:55:53 vmfsppjb006 systemd[1]: Started Operations Management Suite agent.
Oct 28 15:56:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 15:56:37 vmfsppjb006 dbus-daemon[35830]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 15:56:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 15:56:38 vmfsppjb006 setroubleshoot[35830]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 15:56:39 vmfsppjb006 setroubleshoot[35830]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 15:56:39 vmfsppjb006 platform-python[35830]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 16:00:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 16:00:37 vmfsppjb006 dbus-daemon[36124]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 16:00:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 16:00:38 vmfsppjb006 setroubleshoot[36124]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 16:00:39 vmfsppjb006 setroubleshoot[36124]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 16:00:39 vmfsppjb006 platform-python[36124]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 16:05:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 16:05:37 vmfsppjb006 dbus-daemon[36445]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 16:05:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 16:05:38 vmfsppjb006 setroubleshoot[36445]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 16:05:39 vmfsppjb006 setroubleshoot[36445]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 16:05:39 vmfsppjb006 platform-python[36445]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 16:07:05 vmfsppjb006 python3.6[1694]: 2021-10-28T07:07:05.083573Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct 28 16:07:46 vmfsppjb006 journal[6356]: Job Arranger Server[6356]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000152, jobnet_id: JOBNET_2, user_name: Admin
Oct 28 16:07:57 vmfsppjb006 systemd[1]: Started /run/user/1003 mount wrapper.
Oct 28 16:07:57 vmfsppjb006 systemd[1]: Created slice User Slice of UID 1003.
Oct 28 16:07:57 vmfsppjb006 systemd[1]: Starting User Manager for UID 1003...
Oct 28 16:07:57 vmfsppjb006 systemd[1]: Started Session 71 of user jobuser.
Oct 28 16:07:57 vmfsppjb006 systemd-logind[943]: New session 71 of user jobuser.
Oct 28 16:07:57 vmfsppjb006 systemd[36600]: Started Mark boot as successful after the user session has run 2 minutes.
Oct 28 16:07:57 vmfsppjb006 systemd[36600]: Starting D-Bus User Message Bus Socket.
Oct 28 16:07:57 vmfsppjb006 systemd[36600]: Reached target Timers.
Oct 28 16:07:57 vmfsppjb006 systemd[36600]: Reached target Paths.
Oct 28 16:07:58 vmfsppjb006 systemd[36600]: Listening on D-Bus User Message Bus Socket.
Oct 28 16:07:58 vmfsppjb006 systemd[36600]: Reached target Sockets.
Oct 28 16:07:58 vmfsppjb006 systemd[36600]: Reached target Basic System.
Oct 28 16:07:58 vmfsppjb006 systemd[36600]: Reached target Default.
Oct 28 16:07:58 vmfsppjb006 systemd[36600]: Startup finished in 48ms.
Oct 28 16:07:58 vmfsppjb006 systemd[1]: Started User Manager for UID 1003.
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:1:80) [Perftrack_ConsoleStartupStart:PowershellConsoleStartup.WinStart.Informational] PowerShell console is starting up
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerStarted:NamedPipe.Open.Informational] PowerShell has started an IPC listening thread on process: 36626 in AppDomain: None.
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:1:80) [Perftrack_ConsoleStartupStop:PowershellConsoleStartup.WinStop.Informational] PowerShell console is ready for user input
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012#⏎⏎# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:31⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'7.0.6')⏎⏎    {⏎⏎        Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @()⏎⏎⏎⏎if ($Env:ACC_CLOUD -eq $null)⏎⏎{⏎⏎    $FilteredCommands | ForEach-Object {⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC261+oNVq3HT5m⏎⏎# dw4FWBQWo4H4GGfk7ClDDhfjND67sqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0Nv
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012function Write-InstallationCheckToFile⏎⏎{⏎⏎    Param($installationchecks)⏎⏎    if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore)⏎⏎    {⏎⏎        Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎            "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide")⏎⏎    }⏎⏎⏎⏎    $installationchecks.Add("AzSideBySideCheck","true")⏎⏎    try⏎⏎    {⏎⏎        if (Test-Path $pathToInstallationChecks -ErrorAction Ignore)⏎⏎        {⏎⏎            Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop⏎⏎        }⏎⏎⏎⏎        $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop⏎⏎        if (Test-Path $pathToInstallDir -ErrorAction Ignore) ⏎⏎        {⏎⏎            New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop)⏎⏎        }⏎⏎    }⏎⏎    catch⏎⏎    { ⏎⏎        Write-Verbose "Installation checks failed to write to file." ⏎⏎    }⏎⏎}⏎⏎⏎⏎if (!($env:SkipAzInstallationChecks -eq "true"))⏎⏎{⏎⏎    $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json"⏎⏎    $installationchecks = @{}⏎⏎    if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore))⏎⏎    {⏎⏎        Write-InstallationCheckToFile $installationchecks⏎⏎    }⏎⏎    else⏎⏎    {⏎⏎        try⏎⏎        {⏎⏎            ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value }⏎⏎        }⏎⏎        catch⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎⏎⏎        if (!$installationchecks.ContainsKey("AzSideBySideCheck"))⏎⏎        {⏎⏎            Write-InstallationCheckToFile $installationchecks⏎⏎        }⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore⏎⏎# SIG # Begin signature block⏎⏎# MIIjkgYJKoZIhvcNAQcCoIIjgzCCI38CAQExDzANBglghkgBZQMEAgEFADB5Bgor⏎⏎# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG⏎⏎# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l⏎⏎# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYEwggX/MIID56ADAgECAhMzAAAB32vw⏎⏎# LpKnSrTQAAAAAAHfMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD⏎⏎# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p⏎⏎# bmcgUENBIDIwMTEwHhcNMjAxMjE1MjEzMTQ1WhcNMjExMjAyMjEzMTQ1WjB0MQsw⏎⏎# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u⏎⏎# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy⏎⏎# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB⏎⏎# AQC2uxlZEACjqfHkuFyoCwfL25ofI9DZWKt4wEj3JBQ48GPt1UsDv834CcoUUPMn⏎⏎# s/6CtPoaQ4Thy/kbOOg/zJAnrJeiMQqRe2Lsdb/NSI2gXXX9lad1/yPUDOXo4GNw⏎⏎# PjXq1JZi+HZV91bUr6ZjzePj1g+bepsqd/HC1XScj0fT3aAxLRykJSzExEBmU9eS⏎⏎# yuOwUuq+CriudQtWGMdJU650v/KmzfM46Y6lo/MCnnpvz3zEL7PMdUdwqj/nYhGG⏎⏎# 3UVILxX7tAdMbz7LN+6WOIpT1A41rwaoOVnv+8Ua94HwhjZmu1S73yeV7RZZNxoh⏎⏎# EegJi9YYssXa7UZUUkCCA+KnAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE⏎⏎# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUOPbML8IdkNGtCfMmVPtvI6VZ8+Mw⏎⏎# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1⏎⏎# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDYzMDA5MB8GA1UdIwQYMBaAFEhu⏎⏎# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu⏎⏎# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w⏎⏎# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3⏎⏎# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx⏎⏎# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAnnqH⏎⏎# tDyYUFaVAkvAK0eqq6nhoL95SZQu3RnpZ7tdQ89QR3++7A+4hrr7V4xxmkB5BObS⏎⏎# 0YK+MALE02atjwWgPdpYQ68WdLGroJZHkbZdgERG+7tETFl3aKF4KpoSaGOskZXp⏎⏎# TPnCaMo2PXoAMVMGpsQEQswimZq3IQ3nRQfBlJ0PoMMcN/+Pks8ZTL1BoPYsJpok⏎⏎# t6cql59q6CypZYIwgyJ892HpttybHKg1ZtQLUlSXccRMlugPgEcNZJagPEgPYni4⏎⏎# b11snjRAgf0dyQ0zI9aLXqTxWUU5pCIFiPT0b2wsxzRqCtyGqpkGM8P9GazO8eao⏎⏎# mVItCYBcJSByBx/pS0cSYwBBHAZxJODUqxSXoSGDvmTfqUJXntnWkL4okok1FiCD⏎⏎# Z4jpyXOQunb6egIXvkgQ7jb2uO26Ow0m8RwleDvhOMrnHsupiOPbozKroSa6paFt⏎⏎# VSh89abUSooR8QdZciemmoFhcWkEwFg4spzvYNP4nIs193261WyTaRMZoceGun7G⏎⏎# CT2Rl653uUj+F+g94c63AhzSq4khdL4HlFIP2ePv29smfUnHtGq6yYFDLnT0q/Y+⏎⏎# Di3jwloF8EWkkHRtSuXlFUbTmwr/lDDgbpZiKhLS7CBTDj32I0L5i532+uHczw82⏎⏎# oZDmYmYmIUSMbZOgS65h797rj5JJ6OkeEUJoAVwwggd6MIIFYqADAgECAgphDpDS⏎⏎# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK⏎⏎# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0⏎⏎# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0⏎⏎# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla⏎⏎# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT⏎⏎# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB⏎⏎# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG⏎⏎# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S⏎⏎# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz⏎⏎# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7⏎⏎# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u⏎⏎# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33⏎⏎# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl⏎⏎# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP⏎⏎# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB⏎⏎# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF⏎⏎# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM⏎⏎# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ⏎⏎# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud⏎⏎# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO⏎⏎# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0⏎⏎# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y⏎⏎# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }#012#012ScriptBlock ID: 4cf3535f-c5eb-482e-8323-3eb535b85b19#012Path: /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Core.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 268#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Azure.Identity.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 275#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Bcl.AsyncInterfaces.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 282#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 289#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 296#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Memory.Data.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 303#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Numerics.Vectors.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 310#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Runtime.CompilerServices.Unsafe.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 317#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Encodings.Web.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 324#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Text.Json.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 331#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:07:58 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [Pipeline_Detail:ExecutePipeline.Method.Informational] CommandInvocation(Add-Type): "Add-Type"#012ParameterBinding(Add-Type): name="Path"; value="/root/.local/share/powershell/Modules/Az.Accounts/2.5.3/NetCoreAssemblies/System.Threading.Tasks.Extensions.dll"#012ParameterBinding(Add-Type): name="ErrorAction"; value="Ignore"#012CommandInvocation(Out-Null): "Out-Null"#012#012#012Context:#012        Severity = Informational#012        Host Name = ConsoleHost#012        Host Version = 7.1.4#012        Host ID = bf2ae000-2bc9-4be2-9be6-84eb2d374781#012        Host Application = /opt/microsoft/powershell/7/pwsh.dll /SCRIPT/Job_Control/Job_Control_VM.ps1 start rg-finsrvpf-prod-001 vmfsppjbxxx#012        Engine Version = 7.1.4#012        Runspace ID = ccd091ab-cd17-49ba-b809-132a46436337#012        Pipeline ID = 3#012        Command Name = Add-Type#012        Command Type = Cmdlet#012        Script Name = /root/.local/share/powershell/Modules/Az.Accounts/2.5.3/Az.Accounts.psm1#012        Command Path = #012        Sequence Number = 338#012        User = vmfsppjb006\root#012        Connected User = #012        Shell ID = Microsoft.PowerShell#012#012#012User Data:
Oct 28 16:08:10 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 2):#012#⏎⏎# Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session.⏎⏎#⏎⏎# Generated by: Microsoft Corporation⏎⏎#⏎⏎# Generated on: 09/01/2021 07:18:33⏎⏎#⏎⏎⏎⏎$PSDefaultParameterValues.Clear()⏎⏎Set-StrictMode -Version Latest⏎⏎⏎⏎function Test-DotNet⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))⏎⏎        {⏎⏎            throw ".NET Framework versions lower than 4.7.2 are not supported in Az.  Please upgrade to .NET Framework 4.7.2 or higher."⏎⏎        }⏎⏎    }⏎⏎    catch [System.Management.Automation.DriveNotFoundException]⏎⏎    {⏎⏎        Write-Verbose ".NET Framework version check failed."⏎⏎    }⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Desktop'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'5.1')⏎⏎    {⏎⏎        throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."⏎⏎    }⏎⏎⏎⏎    Test-DotNet⏎⏎}⏎⏎⏎⏎if ($true -and ($PSEdition -eq 'Core'))⏎⏎{⏎⏎    if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')⏎⏎    {⏎⏎        throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎if (Get-Module AzureRM.profile -ErrorAction Ignore)⏎⏎{⏎⏎    Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎    throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +⏎⏎        "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")⏎⏎}⏎⏎⏎⏎$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies")⏎⏎if($PSEdition -eq 'Desktop' -and (Test-Path $preloadPath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        Get-ChildItem -ErrorAction Stop -Path $preloadPath -Filter "*.dll" | ForEach-Object {⏎⏎            try⏎⏎            {⏎⏎                Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎            }⏎⏎            catch {⏎⏎                Write-Verbose $_⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies")⏎⏎if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore))⏎⏎{⏎⏎    try⏎⏎    {⏎⏎        $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} )⏎⏎        Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object {⏎⏎            $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName))⏎⏎            $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name})⏎⏎            if (-not $matches)⏎⏎            {⏎⏎                try⏎⏎                {⏎⏎                    Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null⏎⏎                }⏎⏎                catch {⏎⏎                    Write-Verbose $_⏎⏎                }⏎⏎            }⏎⏎        }⏎⏎    }⏎⏎    catch {}⏎⏎}⏎⏎⏎⏎⏎⏎$module = Get-Module Az.Accounts ⏎⏎        if ($module -ne $null -and $module.Version -lt [System.Version]"2.5.1") ⏎⏎{ ⏎⏎    Write-Error "This module requires Az.Accounts version 2.5.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop ⏎⏎} ⏎⏎elseif ($module -eq $null) ⏎⏎{ ⏎⏎    Import-Module Az.Accounts -MinimumVersion 2.5.1 -Scope Global ⏎⏎}⏎⏎Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll)⏎⏎⏎⏎⏎⏎if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)⏎⏎{⏎⏎    Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {⏎⏎        . $_.FullName⏎⏎    }⏎⏎}⏎⏎⏎⏎$FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-Az
Oct 28 16:08:10 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (2 of 2):#012Y3MvcHJpbWFyeWNw⏎⏎# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA⏎⏎# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY⏎⏎# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj⏎⏎# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd⏎⏎# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ⏎⏎# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf⏎⏎# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ⏎⏎# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j⏎⏎# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B⏎⏎# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96⏎⏎# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7⏎⏎# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I⏎⏎# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVZjCCFWICAQEwgZUwfjELMAkG⏎⏎# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx⏎⏎# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z⏎⏎# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAd9r8C6Sp0q00AAAAAAB3zAN⏎⏎# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor⏎⏎# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgBFIpmQBF⏎⏎# GivruoruOXQto52PY8WiEWduGnhBlXakmHYwQgYKKwYBBAGCNwIBDDE0MDKgFIAS⏎⏎# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN⏎⏎# BgkqhkiG9w0BAQEFAASCAQBgAPFeUOEmYD0C6L8CLw7FgAynQ39D4m7ABSsoxBNH⏎⏎# bii8QG+LDEgmlhjlu/UxIuoppdJpKZ8jhgoW1hr25/sV5+XYBv/LcfqgjzZwJg3i⏎⏎# T00qF4m+dsszM3dsZSinjFKSbFkmU9LJcbSAUjc/p24gW5tRxRfhAQ5G9dlduPmJ⏎⏎# DUseTyd3KazWHZokq9/MJrJAnURRxubmmvyzvBUg15w+ZEmoX5FcLVEsN+V43Ufg⏎⏎# WEdSCSZn3GGa9orX0vdblh8OtMU9Mv+epzkYw+h81NpWZoODpkRbj0MY73wiHsoN⏎⏎# sZmLTAvz8y6sA2SZlTR5htqHUIs2Xy2yzHcgpADr2OvnoYIS8DCCEuwGCisGAQQB⏎⏎# gjcDAwExghLcMIIS2AYJKoZIhvcNAQcCoIISyTCCEsUCAQMxDzANBglghkgBZQME⏎⏎# AgEFADCCAVQGCyqGSIb3DQEJEAEEoIIBQwSCAT8wggE7AgEBBgorBgEEAYRZCgMB⏎⏎# MDEwDQYJYIZIAWUDBAIBBQAEIHeWa2kJMZ2tMkUDaSq90fcyFfjCjWzoZ6inhaSy⏎⏎# XN08AgZhHrN5orwYEjIwMjEwOTAxMDc0NDEyLjQzWjAEgAIB9KCB1KSB0TCBzjEL⏎⏎# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v⏎⏎# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWlj⏎⏎# cm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBU⏎⏎# U1MgRVNOOjg5N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T⏎⏎# dGFtcCBTZXJ2aWNloIIORDCCBPUwggPdoAMCAQICEzMAAAFgByDwkkjavusAAAAA⏎⏎# AWAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp⏎⏎# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw⏎⏎# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw⏎⏎# HhcNMjEwMTE0MTkwMjIwWhcNMjIwNDExMTkwMjIwWjCBzjELMAkGA1UEBhMCVVMx⏎⏎# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT⏎⏎# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9wZXJh⏎⏎# dGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5N0Et⏎⏎# RTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl⏎⏎# MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtDGAHNDyxszxUjM+CY31⏎⏎# NaRazaTxLUJlTI3nxIvMtbfXnytln87iXrwZvhKQT+IFRKTjJV6wEo5WidssvecD⏎⏎# AheaxiGfkFHRFc8j1cuLPNWqyVSAc/NM9G0y1m76O3KAKmHkx+q4GJr9KnQeOPuU⏎⏎# QOs0dH8L/X/EJpnJCmAhHuUBEkhpFWHnL5apuqZtSwUigXlQfDDMkUmk5fFi0DS5⏎⏎# a6toql0JTMDOHrCQpmAyRGtc/cT/DlyzhTtxiJiNlEaWbcav68mCTJOwpbc4GJO2⏎⏎# Rpb96O2lb5Lqm7817NcWoDPC5ION4giY454Rq+UD071WkJ7GjXPpUKmnQRvf3Ti6⏎⏎# EwIDAQABo4IBGzCCARcwHQYDVR0OBBYEFKebHvi3qBfgmuF1Mgl1fNDrvh9jMB8G⏎⏎# A1UdIwQYMBaAFNVjOlyKMZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG⏎⏎# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Rp⏎⏎# bVN0YVBDQV8yMDEwLTA3LTAxLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH⏎⏎# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljVGltU3Rh⏎⏎# UENBXzIwMTAtMDctMDEuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYB⏎⏎# BQUHAwgwDQYJKoZIhvcNAQELBQADggEBABU0mAibOgWmiVB1Tydh1xfvJKUoQ/fn⏎⏎# 2qDlD9IWnt7iPl0DVX6Sy+Yp1kHWOGOwGzYiY04i3I1ja7Y3CNrgk3EV/7bL8pNw⏎⏎# /wYT3sfyiCv1z5VvW4cXuC2d7cXy+e/QJvv0riZuGLpLRAiGo9wjxzfpSp4/Aowu⏎⏎# bfYn6873C4pbY0ry/1sDmBC73YCPq5/sAYC41gciHSJmiT5ty4mlg8opjWe9LYRr⏎⏎# WDOYXwn+Ks9jgxby/j+Bp6Qmix+RzqBuiZrjDWAUMYqAqG/u2VPX7ne4cZHZNLWo⏎⏎# xh43AZ8a2OJPFDUGVARmJuTs8V8J74pGFNFMJG3NadKDc0QTTLaoudQwggZxMIIE⏎⏎# WaADAgECAgphCYEqAAAAAAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV⏎⏎# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE⏎⏎# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9v⏎⏎# dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0y⏎⏎# NTA3MDEyMTQ2NTVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u⏎⏎# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp⏎⏎# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjAN⏎⏎# BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RU⏎⏎# ENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBE⏎⏎# D/FgiIRUQwzXTbg4CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50⏎⏎# YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd⏎⏎# /XcfPfBXday9ikJNQFHRD5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR⏎⏎# togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQAB⏎⏎# o4IB5jCCAeIwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8⏎⏎# RhvFM2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB⏎⏎# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO⏎⏎# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w⏎⏎# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr⏎⏎# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv⏎⏎# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSAB⏎⏎# Af8EgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3⏎⏎# dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEF⏎⏎# BQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt⏎⏎# AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Eh⏎⏎# b7Prpsz1Mb7PBeKp/vpXbRkws8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7⏎⏎# uVOMzPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqR⏎⏎# UgCvOA8X9S95gWXZqbVr5MfO9sp6AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9⏎⏎# Va8v/rbljjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8⏎⏎# +n99lmqQeKZt0uGc+R38ONiU9MalCpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+⏎⏎# Y1klD3ouOVd2onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh⏎⏎# 2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRy⏎⏎# zR30uIUBHoD7G4kqVDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoo⏎⏎# uLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx⏎⏎# 16HSxVXjad5XwdHeMMD9zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341⏎⏎# Hgi62jbb01+P3nSISRKhggLSMIICOwIBATCB/KGB1KSB0TCBzjELMAkGA1UEBhMC⏎⏎# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV⏎⏎# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMgTWljcm9zb2Z0IE9w⏎⏎# ZXJhdGlvbnMgUHVlcnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg5⏎⏎# N0EtRTM1Ni0xNzAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2⏎⏎# aWNloiMKAQEwBwYFKw4DAhoDFQD7MpJ0dYtE3MiXKodXFdmAqdnQoqCBgzCBgKR+⏎⏎# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS⏎⏎# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT⏎⏎# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA⏎⏎# 5NmscTAiGA8yMDIxMDkwMTExMzgyNVoYDzIwMjEwOTAyMTEzODI1WjB3MD0GCisG⏎⏎# AQQBhFkKBAExLzAtMAoCBQDk2axxAgEAMAoCAQACAh2hAgH/MAcCAQACAhIvMAoC⏎⏎# BQDk2v3xAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA⏎⏎# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAIT1LnO5WjqheitIR⏎⏎# iwiodv99YEX2dCveaoz36HhVlU/a7MgVnOZSDzT2aYSU3VCJ0wjsWxMO5o5KBQCT⏎⏎# I2+Q3TS9cdrTFxmPfB402wfwYTva/Z08a5PJKWA0UDF+5TEPmmt3xjDlFOAc51pi⏎⏎# uHyowaePbFOXFv98sdjapgkLAmIxggMNMIIDCQ
Oct 28 16:08:10 vmfsppjb006 powershell[36626]: (7.1.4:9:80) [ScriptBlock_Compile_Detail:ExecuteCommand.Create.Warning] Creating Scriptblock text (1 of 1):#012{⏎⏎⏎⏎        $existingDefault = $false⏎⏎        foreach ($key in $global:PSDefaultParameterValues.Keys)⏎⏎        {⏎⏎    #011    if ($_ -like "$key")⏎⏎    #011        {⏎⏎        #011    $existingDefault = $true⏎⏎    #011        }⏎⏎#011    }⏎⏎⏎⏎        if (!$existingDefault)⏎⏎        {⏎⏎            $global:PSDefaultParameterValues.Add($_,⏎⏎                {⏎⏎                    if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)⏎⏎                    {⏎⏎                        $context = Get-AzureRmContext⏎⏎                    }⏎⏎                    else⏎⏎                    {⏎⏎                        $context = Get-AzContext⏎⏎                    }⏎⏎                    if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {⏎⏎                        $context.ExtendedProperties["Default Resource Group"]⏎⏎                    }⏎⏎                })⏎⏎        }⏎⏎    }#012#012ScriptBlock ID: 60742395-4315-412d-affe-77929e5cc273#012Path: /root/.local/share/powershell/Modules/Az.Compute/4.17.0/Az.Compute.psm1
Oct 28 16:08:12 vmfsppjb006 jobuser[36663]: VM Start/Stop Script is failed. Cause:[ Command failed ], Operation:[ start ], ResourceGroupName:[ rg-finsrvpf-prod-001 ], VirtualMachineName:[ vmfsppjbxxx ]
Oct 28 16:08:12 vmfsppjb006 powershell[36626]: (7.1.4:7:80) [NamedPipeIPC_ServerListenerError:NamedPipe.Exception.Error] An error has occurred in PowerShell IPC listening thread on process: 36626 in AppDomain: None.  Error Message: Operation canceled.
Oct 28 16:08:12 vmfsppjb006 systemd-logind[943]: Session 71 logged out. Waiting for processes to exit.
Oct 28 16:08:12 vmfsppjb006 systemd-logind[943]: Removed session 71.
Oct 28 16:08:12 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 16:08:12 vmfsppjb006 systemd[1]: Stopping User Manager for UID 1003...
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Stopped target Default.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Stopped target Basic System.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Stopped target Paths.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Stopped target Sockets.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Closed D-Bus User Message Bus Socket.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Stopped target Timers.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Stopped Mark boot as successful after the user session has run 2 minutes.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Reached target Shutdown.
Oct 28 16:08:12 vmfsppjb006 systemd[36600]: Starting Exit the Session...
Oct 28 16:08:12 vmfsppjb006 systemd[1]: user@1003.service: Killing process 36666 (systemctl) with signal SIGKILL.
Oct 28 16:08:12 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 16:08:12 vmfsppjb006 systemd[1]: Stopped User Manager for UID 1003.
Oct 28 16:08:12 vmfsppjb006 systemd[1]: user-runtime-dir@1003.service: Unit not needed anymore. Stopping.
Oct 28 16:08:12 vmfsppjb006 systemd[1]: Stopping /run/user/1003 mount wrapper...
Oct 28 16:08:12 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 1003.
Oct 28 16:08:12 vmfsppjb006 systemd[1]: Stopped /run/user/1003 mount wrapper.
Oct 28 16:08:23 vmfsppjb006 python3.6[1694]: 2021-10-28T07:08:23.348459Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.5.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 14;HeartbeatId: 284CEDB7-AC67-4E37-8238-6B8A68E50CB9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct 28 16:08:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 16:08:37 vmfsppjb006 dbus-daemon[36691]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 16:08:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 16:08:38 vmfsppjb006 setroubleshoot[36691]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 16:08:39 vmfsppjb006 setroubleshoot[36691]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 16:08:39 vmfsppjb006 platform-python[36691]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Created slice User Slice of UID 986.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Started /run/user/986 mount wrapper.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Starting User Manager for UID 986...
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Started Session 73 of user omsagent.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Reached target Timers.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Reached target Paths.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Starting D-Bus User Message Bus Socket.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Listening on D-Bus User Message Bus Socket.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Reached target Sockets.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Reached target Basic System.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Reached target Default.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Startup finished in 48ms.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Started User Manager for UID 986.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Stopping User Manager for UID 986...
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Stopped target Default.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Stopped target Basic System.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Stopped target Sockets.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Closed D-Bus User Message Bus Socket.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Stopped target Paths.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Reached target Shutdown.
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Starting Exit the Session...
Oct 28 16:09:01 vmfsppjb006 systemd[36731]: Stopped target Timers.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: user@986.service: Killing process 36772 (systemctl) with signal SIGKILL.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Stopped User Manager for UID 986.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: user-runtime-dir@986.service: Unit not needed anymore. Stopping.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Removed slice User Slice of UID 986.
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Stopping /run/user/986 mount wrapper...
Oct 28 16:09:01 vmfsppjb006 systemd[1]: Stopped /run/user/986 mount wrapper.
Oct 28 16:09:18 vmfsppjb006 journal[6356]: Job Arranger Server[6356]: [JAJOBNET000001] In jajobnet_kill() jobnet was forced to stop. inner_jobnet_id: 1500000000000000153, jobnet_id: JOBNET_2, user_name: Admin
Oct 28 16:09:37 vmfsppjb006 dbus-daemon[903]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.46' (uid=0 pid=868 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper)
Oct 28 16:09:37 vmfsppjb006 dbus-daemon[36813]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted
Oct 28 16:09:38 vmfsppjb006 dbus-daemon[903]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
Oct 28 16:09:38 vmfsppjb006 setroubleshoot[36813]: failed to retrieve rpm info for /run/zabbix/zabbix_server_lld.sock
Oct 28 16:09:39 vmfsppjb006 setroubleshoot[36813]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock. For complete SELinux messages run: sealert -l 0aa5cc03-bb83-4b53-bb8f-d9139efd507c
Oct 28 16:09:39 vmfsppjb006 platform-python[36813]: SELinux is preventing zabbix_server from connectto access on the unix_stream_socket /run/zabbix/zabbix_server_lld.sock.#012#012*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************#012#012If you want to allow daemons to enable cluster mode#012Then you must tell SELinux about this by enabling the 'daemons_enable_cluster_mode' boolean.#012#012Do#012setsebool -P daemons_enable_cluster_mode 1#012#012*****  Plugin catchall (11.6 confidence) suggests   **************************#012#012If you believe that zabbix_server should be allowed connectto access on the zabbix_server_lld.sock unix_stream_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_server' --raw | audit2allow -M my-zabbixserver#012# semodule -X 300 -i my-zabbixserver.pp#012
