This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nov 10 00:38:00 data kernel: [ 5220.298963] type=1400 audit(1415576280.195:4464): apparmor="ALLOWED" operation="exec" profile="/usr/local/sbin/netatalk" pid=7911 comm="netatalk" requested_mask="x" denied_mask="x" fsuid=0 ouid=0 target="/usr/local/sbin/netatalk//null-d" | |
Nov 10 00:38:00 data kernel: [ 5220.299929] type=1400 audit(1415576280.195:4465): apparmor="ALLOWED" operation="file_inherit" profile="/usr/local/sbin/netatalk//null-d" name="/dev/null" pid=7911 comm="sh" requested_mask="rw" denied_mask="rw" fsuid=0 ouid=0 | |
Nov 10 00:38:00 data kernel: [ 5220.299947] type=1400 audit(1415576280.195:4466): apparmor="ALLOWED" operation="file_inherit" profile="/usr/local/sbin/netatalk//null-d" name="/dev/null" pid=7911 comm="sh" requested_mask="rw" denied_mask="rw" fsuid=0 ouid=0 | |
Nov 10 00:38:00 data kernel: [ 5220.299961] type=1400 audit(1415576280.195:4467): apparmor="ALLOWED" operation="file_inherit" profile="/usr/local/sbin/netatalk//null-d" name="/dev/null" pid=7911 comm="sh" requested_mask="rw" denied_mask="rw |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2021-10-28T20:10:36.3770891Z 2021-10-28T20:10:35.804Z [WARN] Provider "registry.terraform.io/hashicorp/azurerm" produced an invalid plan for azurerm_eventhub_namespace.main, but we are tolerating it because it is using the legacy plugin SDK. | |
2021-10-28T20:10:36.3771593Z The following problems may be the cause of any confusing errors from downstream operations: | |
2021-10-28T20:10:36.3775395Z - .network_rulesets: planned value cty.ListVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"default_action":cty.StringVal("Deny"), "ip_rule":cty.ListValEmpty(cty.Object(map[string]cty.Type{"action":cty.String, "ip_mask":cty.String})), "trusted_service_access_enabled":cty.True, "virtual_network_rule":cty.ListValEmpty(cty.Object(map[string]cty.Type{"ignore_missing_virtual_network_service_endpoint":cty.Bool, "subnet_id":cty.String}))})}) does not match config value cty.ListVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"default_action":cty.StringVal("Deny"), "ip_rule":cty.NullVal(cty.List(cty.Object(map[string |
OlderNewer