460931]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Feb 28 02:39:19 ip-172-31-29-215 sessionclean[1460931]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Feb 28 02:39:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Feb 28 02:39:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Feb 28 02:40:01 ip-172-31-29-215 CRON[1460973]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Feb 28 03:00:01 ip-172-31-29-215 CRON[1461028]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Feb 28 03:03:10 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: 2026-02-28 03:03:10.1906 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Feb 28 03:03:10 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: 2026-02-28 03:03:10.2257 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Feb 28 03:03:10 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: #011status code: 400, request id: 8d411586-4836-4cb8-9b3f-2979c9c4e021 Feb 28 03:09:01 ip-172-31-29-215 CRON[1461055]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Feb 28 03:09:19 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Feb 28 03:09:19 ip-172-31-29-215 sessionclean[1461068]: Cannot load Xdebug - it was already loaded Feb 28 03:09:19 ip-172-31-29-215 sessionclean[1461068]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Feb 28 03:09:19 ip-172-31-29-215 sessionclean[1461068]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Feb 28 03:09:19 ip-172-31-29-215 sessionclean[1461068]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Feb 28 03:09:19 ip-172-31-29-215 sessionclean[1461068]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Feb 28 03:09:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Feb 28 03:09:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Feb 28 03:10:01 ip-172-31-29-215 CRON[1461110]: (root) CMD (test -e /run/systemd/system || SERVICE_MODE=1 /sbin/e2scrub_all -A -r) Feb 28 03:17:01 ip-172-31-29-215 CRON[1461116]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly) Feb 28 03:20:01 ip-172-31-29-215 CRON[1461121]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Feb 28 03:29:35 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: 2026-02-28 03:29:35.2272 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Feb 28 03:29:35 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: 2026-02-28 03:29:35.2606 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Feb 28 03:29:35 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: #011status code: 400, request id: f0a3b970-27f1-47fa-b8dozilla/5.0" 204.76.203.8 - - [28/Feb/2026:03:03:53 -0600] "PROPFIND / HTTP/1.1" 405 4221 "http://3.22.251.217:443/" "-" 136.143.176.64 - - [28/Feb/2026:03:06:36 -0600] "GET /PCI-test/trademarks.csv HTTP/1.1" 200 37354441 "-" "Zoho_Analytics" 180.165.8.178 - - [28/Feb/2026:03:14:41 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-121073.png HTTP/1.1" 200 130248 "https://qiye.aliyun.com/alimail/entries/v5.1/mail/followUp/all/eyJpZCI6IjJfMDpEenp6enlMOTlhZSQtLS0uZW02Mm92diIsInR5cGUiOiJtYWlsIiwiaXNEcmFmdE1haWwiOmZhbHNlfQ" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/145.0.0.0 Safari/537.36" 93.174.93.12 - - [28/Feb/2026:03:22:01 -0600] "\x16\x03\x02\x01o\x01" 400 488 "-" "-" 185.242.226.110 - - [28/Feb/2026:03:25:28 -0600] "GET / HTTP/1.1" 200 3421 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" 136.143.176.60 - - [28/Feb/2026:03:49:18 -0600] "GET /PCI-test/fetch_trademark_csv.php HTTP/1.1" 200 4039 "-" "Apache-HttpClient/4.5.13 (Java/17.0.18)" 143.198.86.151 - - [28/Feb/2026:03:51:41 -0600] "GET / HTTP/1.1" 200 11229 "https://apschool.jeveuxunsite.io//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36" 143.198.86.151 - - [28/Feb/2026:03:51:41 -0600] "GET /xmlrpc.php?rsd HTTP/1.1" 404 492 "https://apschool.jeveuxunsite.io//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36" 143.198.86.151 - - [28/Feb/2026:03:51:41 -0600] "GET /blog/robots.txt HTTP/1.1" 404 492 "https://apschool.jeveuxunsite.io//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36" 143.198.86.151 - - [28/Feb/2026:03:51:41 -0600] "GET /blog/ HTTP/1.1" 404 492 "https://apschool.jeveuxunsite.io//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36" 143.198.86.151 - - [28/Feb/2026:03:51:42 -0600] "GET /wordpress/ HTTP/1.1" 404 492 "https://apschool.jeveuxunsite.io//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36" 143.198.86.151 - - [28/Feb/2026:03:51:42 -0600] "GET /wp/ HTTP/1.1" 404 492 "https://apschool.jeveuxunsite.io//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36" 204.76.203.18 - - [28/Feb/2026:03:51:53 -0600] "GET / HTTP/1.1" 200 11173 "-" "-" 20.65.194.59 - - [28/Feb/2026:03:57:57 -0600] "GET /autodiscover/autodiscover.json?@zdi/Powershell HTTP/1.1" 404 3548 "-" "Mozilla/5.0 zgrab/0.x" 20.104.124.39 - - [28/Feb/2026:04:00:14 -0600] "GET /wp-content/plugins/hellopress/wp_filemanager.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /class-t.api.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /zwso.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /wp-admin/css/colors/blue/index.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /class19.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /class20.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /admin.php?p= HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /randkeyword.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /fwe.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:15 -0600] "GET /images/m.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:17 -0600] "GET /g.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:17 -0600] "GET /tx1.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:17 -0600] "GET /xv.php HTTP/1.1" 404 442 "-" "-" 20.104.124.39 - - [28/Feb/2026:04:00:19 -0600] "GET /x56.php HTTP/1.1" 404 442 "-" "-" 2a-6abbad044ad0 Feb 28 03:39:00 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Feb 28 03:39:00 ip-172-31-29-215 sessionclean[1461165]: Cannot load Xdebug - it was already loaded Feb 28 03:39:00 ip-172-31-29-215 sessionclean[1461165]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Feb 28 03:39:00 ip-172-31-29-215 sessionclean[1461165]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Feb 28 03:39:00 ip-172-31-29-215 sessionclean[1461165]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Feb 28 03:39:00 ip-172-31-29-215 sessionclean[1461165]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Feb 28 03:39:00 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Feb 28 03:39:00 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Feb 28 03:39:01 ip-172-31-29-215 CRON[1461205]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Feb 28 03:40:01 ip-172-31-29-215 CRON[1461208]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Feb 28 03:56:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: 2026-02-28 03:56:02.2620 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Feb 28 03:56:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: 2026-02-28 03:56:02.2967 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Feb 28 03:56:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[480765]: #011status code: 400, request id: 1bb49cb8-e11a-4f2a-9467-a790390e1694 Feb 28 04:00:01 ip-172-31-29-215 CRON[1461490]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Feb 28 04:09:01 ip-172-31-29-215 CRON[1461526]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Feb 28 04:09:13 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Feb 28 04:09:13 ip-172-31-29-215 sessionclean[1461541]: Cannot load Xdebug - it was already loaded Feb 28 04:09:13 ip-172-31-29-215 sessionclean[1461541]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Feb 28 04:09:13 ip-172-31-29-215 sessionclean[1461541]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Feb 28 04:09:13 ip-172-31-29-215 sessionclean[1461541]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Feb 28 04:09:13 ip-172-31-29-215 sessionclean[1461541]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Feb 28 04:09:13 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Feb 28 04:09:13 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Feb 28 04:17:01 ip-172-31-29-215 CRON[1461588]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly) Feb 28 04:20:01 ip-172-31-29-215 CRON[1461594]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /{"data":{"auth":{"last-id":0,"users":null,"device":{"brand":"canonical","model":"aws-classic","serial":"d54ba04a-695c-4c8a-80be-19b0df80cf46","key-id":"iJU_vyejSQtLnAQVmtHHq9RX72Jb40JMWVv9GgpJ6311Gr12A8_tSCoURR6sJoZ0","session-macaroon":"MDAxZWxvY2F0aW9uIGFwaS5zbmFwY3JhZnQuaW8KMDAxZWlkZW50aWZpZXIgZGV2aWNlLXNlc3Npb24KMDA0MGNpZCBhcGkuc25hcGNyYWZ0LmlvfHZhbGlkX3NpbmNlfDIwMjYtMDItMjRUMDY6NTk6MjIuNzAzMjk0CjAwNDZjaWQgYXBpLnNuYXBjcmFmdC5pb3xzZXNzaW9ufGM4Y2ZiOWM5LTk0YTItNGNiNi1hMmQ0LTY2ODRkZTcxNDNjMAowMDliY2lkIGFwaS5zbmFwY3JhZnQuaW98ZGV2aWNlfHsiYXV0aG9yaXR5IjogImNhbm9uaWNhbCIsICJicmFuZCI6ICJjYW5vbmljYWwiLCAibW9kZWwiOiAiYXdzLWNsYXNzaWMiLCAic2VyaWFsIjogImQ1NGJhMDRhLTY5NWMtNGM4YS04MGJlLTE5YjBkZjgwY2Y0NiJ9CjAwMjBjaWQgYXBpLnNuYXBjcmFmdC5pb3xzdG9yZXwKMDAyZnNpZ25hdHVyZSDTfAHQ4FgVX-1MmXz4qxxYhXWnzlD5yZ9BytaTBlZk4Ao"}},"config":{"core":{"cloud":{"availability-zone":"us-east-2b","name":"aws","region":"us-east-2"},"refresh":{},"seed":{"loaded":true}}},"conns":{"lxd:lxd-support core:lxd-support":{"auto":true,"interface":"lxd-support"},"lxd:network core:network":{"auto":true,"interface":"network"},"lxd:network-bind core:network-bind":{"auto":true,"interface":"network-bind"},"lxd:system-observe core:system-observe":{"auto":true,"interface":"system-observe"}},"last-refresh":"2026-02-28T04:29:22.751768045-06:00","last-refresh-hints":"2021-04-23T00:34:45.749036127Z","patch-level":6,"patch-sublevel":3,"patch-sublevel-last-version":"2.73","preseed-start-time":"2021-02-23T23:49:58.007053445Z","preseed-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"preseed-time":"2021-02-23T23:50:04.446239096Z","preseeded":true,"refresh-candidates":{},"refresh-privacy-key":"g704FHcv0Pckm3nj","seed-restart-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"seed-restart-time":"2021-04-23T00:34:45.451530228Z","seed-time":"2021-04-23T00:34:48.134686428Z","seeded":true,"seeded-systems":[{"system":"","model":"aws-classic","brand-id":"canonical","revision":0,"timestamp":"2018-03-28T00:00:00Z","seed-time":"2021-04-23T00:34:48.134686428Z"}],"snap-cookies":{"5e51KAapWFH2S6Pq1_k5pj38kDCJfBGZwj4Lccy9-4ZzKV4QK38Q":"core22","9Ik8_T1g-vkB36qtEVtFHQ26GEq_1MVDiz64viTuob-kh7QJ-bXp":"core18","EgCCiF-EA1LESrzE6f7eWTsNNarEnFo4zqZZpgEm0KEs24FOYGDp":"snapd","MCsSyQl6v8ejlpGpqXRE4xUuBmjFcy7BylqrohPSDnR2hEgomXrT":"core20","plf6ZN7S7plAWwR473QRPz37i90mVRnKUR7Q6hYe4Ja1rFrT7wqj":"lxd","qJXNu_kWACy61RpAISymmAAH01SCjAM7rFrMKIMjCjTTeTWvkFng":"amazon-ssm-agent"},"snapd-snap-cve-2021-44731-vuln-removed":true,"snapd-snap-cve-2022-3328-vuln-removed":true,"snaps":{"amazon-ssm-agent":{"type":"app","sequence":[{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"11797","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."},{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"12322","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."}],"active":true,"current":"12322","channel":"latest/stable/ubuntu-20.04","classic":true,"aliases":{"ssm-cli":{"auto":"ssm-cli"}},"last-refresh-time":"2025-12-15T12:24:22.958187084-06:00","base":"core22"},"core18":{"type":"base","sequence":[{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2976","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2979","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2979","channel":"latest/stable","last-refresh-time":"2026-01-18T19:04:25.3230931-06:00"},"core20":{"type":"base","sequence":[{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2686","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2717","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2717","channel":"latest/stable","last-refresh-time":"2026-02-18T23:49:26.74156509-06:00"},"core22":{"type":"base","sequence":[{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"2216","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"2292","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2292","channel":"latest/stable","last-refresh-time":"2026-01-28T09:09:26.300236145-06:00"},"lxd":{"type":"app","sequence":[{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"32662","channel":"4.0/stable","links":{"contact":["mailto:lxd@lists.canonical.com"],"issues":["https://github.com/canonical/lxd/issues"],"source":["https://github.com/canonical/lxd"],"website":["https://ubuntu.com/lxd"]},"contact":"mailto:lxd@lists.canonical.com","title":"LXD","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - apparmor.unprivileged-restrictions-disable: Whether to disable restrictions on unprivileged user namespaces [default=true]\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - lxcfs.debug: Increase logging to debug level [default=false]\n - minio.path: Path to the directory containing the minio and mc binaries to use with LXD [default=\"\"]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - ui.enable: Enable the web interface [default=true]\n - zfs.external: Use the system's ZFS tools [default=false]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"},{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"36554","channel":"4.0/stable","links":{"contact":["mailto:lxd@lists.canonical.com"],"issues":["https://github.com/canonical/lxd/issues"],"source":["https://github.com/canonical/lxd"],"website":["https://ubuntu.com/lxd"]},"contact":"mailto:lxd@lists.canonical.com","title":"LXD","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - apparmor.unprivileged-restrictions-disable: Whether to disable restrictions on unprivileged user namespaces [default=true]\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - db.trace: Enable dqlite trace logging (very verbose) [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - lxcfs.debug: Increase logging to debug level [default=false]\n - minio.path: Path to the directory containing the minio and mc binaries to use with LXD [default=\"\"]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - ui.enable: Enable the web interface [default=true]\n - zfs.external: Use the system's ZFS tools [default=false]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"}],"active":true,"current":"36554","channel":"4.0/stable/ubuntu-20.04","aliases":{"lxc":{"auto":"lxc"}},"last-refresh-time":"2025-11-26T10:49:18.039712567-06:00","base":"core20"},"snapd":{"type":"snapd","sequence":[{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"25577","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."},{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"25935","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."}],"active":true,"current":"25935","channel":"latest/stable","required":true,"last-refresh-time":"2026-01-07T04:24:16.188780518-06:00"}},"start-of-operation-time":"2021-04-23T00:34:45.630907428Z","timings":[{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":784168522}],"start-time":"2026-02-06T06:19:22.158099496-06:00","stop-time":"2026-02-06T06:19:22.942268023-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":779467794}],"start-time":"2026-02-06T13:09:22.162322657-06:00","stop-time":"2026-02-06T13:09:22.941790449-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":636592411}],"start-time":"2026-02-06T21:54:22.158099951-06:00","stop-time":"2026-02-06T21:54:22.794692366-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":659594370}],"start-time":"2026-02-07T04:39:22.158068229-06:00","stop-time":"2026-02-07T04:39:22.817662587-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":272166658},{"label":"write-catalogs","summary":"query store for catalogs","duration":734074130}],"start-time":"2026-02-07T05:59:22.239285378-06:00","stop-time":"2026-02-07T05:59:23.255748048-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":669437123}],"start-time":"2026-02-07T11:19:22.158743601-06:00","stop-time":"2026-02-07T11:19:22.828180722-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":652740182}],"start-time":"2026-02-07T16:39:22.159202713-06:00","stop-time":"2026-02-07T16:39:22.811942897-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":667620358}],"start-time":"2026-02-07T19:39:22.158889078-06:00","stop-time":"2026-02-07T19:39:22.826509437-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":690946891}],"start-time":"2026-02-08T00:44:22.158091154-06:00","stop-time":"2026-02-08T00:44:22.849038045-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":282778877},{"label":"write-catalogs","summary":"query store for catalogs","duration":770445274}],"start-time":"2026-02-08T06:04:22.15824678-06:00","stop-time":"2026-02-08T06:04:23.223757264-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":668176666}],"start-time":"2026-02-08T06:59:22.159421343-06:00","stop-time":"2026-02-08T06:59:22.827598-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":650787552}],"start-time":"2026-02-08T14:39:22.158145285-06:00","stop-time":"2026-02-08T14:39:22.808932836-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1103442483}],"start-time":"2026-02-08T18:24:22.165317369-06:00","stop-time":"2026-02-08T18:24:23.268759843-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":884255213}],"start-time":"2026-02-09T04:54:22.158067565-06:00","stop-time":"2026-02-09T04:54:23.042322778-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":309867691},{"label":"write-catalogs","summary":"query store for catalogs","duration":962631953}],"start-time":"2026-02-09T06:04:22.158368275-06:00","stop-time":"2026-02-09T06:04:23.441191214-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":933981335}],"start-time":"2026-02-09T10:04:22.158176648-06:00","stop-time":"2026-02-09T10:04:23.092157986-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":953755781}],"start-time":"2026-02-09T12:24:22.158178888-06:00","stop-time":"2026-02-09T12:24:23.111934665-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":746993859}],"start-time":"2026-02-09T22:19:22.17748595-06:00","stop-time":"2026-02-09T22:19:22.924479811-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":815493610}],"start-time":"2026-02-10T03:14:22.158104447-06:00","stop-time":"2026-02-10T03:14:22.973598058-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":726209796}],"start-time":"2026-02-10T06:49:22.158186324-06:00","stop-time":"2026-02-10T06:49:22.884396121-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":756580410}],"start-time":"2026-02-10T14:24:22.158450754-06:00","stop-time":"2026-02-10T14:24:22.915031167-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":751387969}],"start-time":"2026-02-10T22:24:22.158789689-06:00","stop-time":"2026-02-10T22:24:22.910177666-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":889214595}],"start-time":"2026-02-11T03:39:22.172222893-06:00","stop-time":"2026-02-11T03:39:23.061437489-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":789681566}],"start-time":"2026-02-11T11:29:22.232777975-06:00","stop-time":"2026-02-11T11:29:23.022459525-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":644214226}],"start-time":"2026-02-11T16:24:22.158418661-06:00","stop-time":"2026-02-11T16:24:22.802632878-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":855256331}],"start-time":"2026-02-11T18:59:22.158111142-06:00","stop-time":"2026-02-11T18:59:23.013367455-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":833058494}],"start-time":"2026-02-12T05:49:22.160036341-06:00","stop-time":"2026-02-12T05:49:22.99309483-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":721029245}],"start-time":"2026-02-12T06:49:22.158333748-06:00","stop-time":"2026-02-12T06:49:22.879362896-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":724279451}],"start-time":"2026-02-12T16:09:22.160326724-06:00","stop-time":"2026-02-12T16:09:22.884606156-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":723274920}],"start-time":"2026-02-12T23:19:22.158185487-06:00","stop-time":"2026-02-12T23:19:22.881460403-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":712878455}],"start-time":"2026-02-13T01:24:22.158051309-06:00","stop-time":"2026-02-13T01:24:22.870929761-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":280779025},{"label":"write-catalogs","summary":"query store for catalogs","duration":873160700}],"start-time":"2026-02-13T06:14:22.182064421-06:00","stop-time":"2026-02-13T06:14:23.341084967-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":723638138}],"start-time":"2026-02-13T06:29:22.159249272-06:00","stop-time":"2026-02-13T06:29:22.882887315-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":821413811}],"start-time":"2026-02-13T13:59:22.158463127-06:00","stop-time":"2026-02-13T13:59:22.979876928-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1068229301}],"start-time":"2026-02-13T19:59:22.161411942-06:00","stop-time":"2026-02-13T19:59:23.229641256-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":649991638}],"start-time":"2026-02-14T01:09:22.245616783-06:00","stop-time":"2026-02-14T01:09:22.89560841-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":665866920}],"start-time":"2026-02-14T08:29:22.188858037-06:00","stop-time":"2026-02-14T08:29:22.854724942-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":611551250}],"start-time":"2026-02-14T12:09:22.158128565-06:00","stop-time":"2026-02-14T12:09:22.769679805-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":645858176}],"start-time":"2026-02-14T21:59:22.158334624-06:00","stop-time":"2026-02-14T21:59:22.804192805-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":741094228}],"start-time":"2026-02-15T04:49:22.158118303-06:00","stop-time":"2026-02-15T04:49:22.899212517-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":618795622}],"start-time":"2026-02-15T10:44:22.158066216-06:00","stop-time":"2026-02-15T10:44:22.776863371-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":660974152}],"start-time":"2026-02-15T12:04:22.158169384-06:00","stop-time":"2026-02-15T12:04:22.819143522-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":646556616}],"start-time":"2026-02-15T23:44:22.158877054-06:00","stop-time":"2026-02-15T23:44:22.805433669-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":697080165}],"start-time":"2026-02-16T04:44:22.158525235-06:00","stop-time":"2026-02-16T04:44:22.855605401-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":285696499},{"label":"write-catalogs","summary":"query store for catalogs","duration":793070240}],"start-time":"2026-02-16T06:19:22.170696826-06:00","stop-time":"2026-02-16T06:19:23.261761113-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":777022506}],"start-time":"2026-02-16T08:29:22.158077414-06:00","stop-time":"2026-02-16T08:29:22.935099904-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":672581123}],"start-time":"2026-02-16T17:14:22.158044386-06:00","stop-time":"2026-02-16T17:14:22.830625513-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":653831331}],"start-time":"2026-02-16T23:24:22.15810464-06:00","stop-time":"2026-02-16T23:24:22.811935972-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":767066916}],"start-time":"2026-02-17T04:44:22.158132217-06:00","stop-time":"2026-02-17T04:44:22.925199122-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":686152905}],"start-time":"2026-02-17T06:49:22.158088848-06:00","stop-time":"2026-02-17T06:49:22.844241734-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":730551833}],"start-time":"2026-02-17T15:44:22.158025824-06:00","stop-time":"2026-02-17T15:44:22.888577597-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":686593721}],"start-time":"2026-02-17T19:59:22.158536688-06:00","stop-time":"2026-02-17T19:59:22.845130632-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":982529640}],"start-time":"2026-02-18T05:09:22.228744032-06:00","stop-time":"2026-02-18T05:09:23.211273677-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":480538022},{"label":"write-catalogs","summary":"query store for catalogs","duration":1316425593}],"start-time":"2026-02-18T06:24:22.158551117-06:00","stop-time":"2026-02-18T06:24:23.966200452-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":784390132}],"start-time":"2026-02-18T08:54:22.158876603-06:00","stop-time":"2026-02-18T08:54:22.943266732-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":718324512}],"start-time":"2026-02-18T16:29:22.188251353-06:00","stop-time":"2026-02-18T16:29:22.906575868-06:00"},{"tags":{"change-id":"180","ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1297693862}],"start-time":"2026-02-18T23:49:22.158114485-06:00","stop-time":"2026-02-18T23:49:23.455808331-06:00"},{"tags":{"change-id":"180","task-id":"3891","task-kind":"download-snap","task-status":"Doing"},"timings":[{"label":"download","summary":"download snap \"core20\"","duration":1349072824}],"start-time":"2026-02-18T23:49:23.508668255-06:00","stop-time":"2026-02-18T23:49:24.857740951-06:00"},{"tags":{"change-id":"180","task-id":"3893","task-kind":"mount-snap","task-status":"Doing"},"timings":[{"label":"check-snap","summary":"check snap \"core20\"","duration":257781467},{"label":"setup-snap","summary":"setup snap \"core20\"","duration":530076733}],"start-time":"2026-02-18T23:49:25.693409478-06:00","stop-time":"2026-02-18T23:49:26.481271503-06:00"},{"tags":{"change-id":"180","task-id":"3899","task-kind":"setup-profiles","task-status":"Doing"},"timings":[{"label":"setup-security-backend","summary":"setup security backend \"seccomp\" for snap \"core20\"","duration":7883040},{"label":"setup-security-backend","summary":"setup security backend \"configfiles\" for snap \"core20\"","duration":15327766}],"start-time":"2026-02-18T23:49:26.678560064-06:00","stop-time":"2026-02-18T23:49:26.713514414-06:00"},{"tags":{"change-id":"180","task-id":"3900","task-kind":"link-snap","task-status":"Doing"},"start-time":"2026-02-18T23:49:26.735444969-06:00","stop-time":"2026-02-18T23:49:26.736570363-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":679853756}],"start-time":"2026-02-19T00:09:22.159316306-06:00","stop-time":"2026-02-19T00:09:22.839170058-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":715973481}],"start-time":"2026-02-19T07:04:22.158043331-06:00","stop-time":"2026-02-19T07:04:22.874016801-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":732824619}],"start-time":"2026-02-19T12:44:22.158007811-06:00","stop-time":"2026-02-19T12:44:22.890832427-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":710465017}],"start-time":"2026-02-19T22:09:22.159049896-06:00","stop-time":"2026-02-19T22:09:22.869514923-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":855291488}],"start-time":"2026-02-20T03:44:22.158059644-06:00","stop-time":"2026-02-20T03:44:23.013351128-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":286167360},{"label":"write-catalogs","summary":"query store for catalogs","duration":933218502}],"start-time":"2026-02-20T06:29:22.158280468-06:00","stop-time":"2026-02-20T06:29:23.387548624-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":722786140}],"start-time":"2026-02-20T09:49:22.158149376-06:00","stop-time":"2026-02-20T09:49:22.88093551-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":660589258}],"start-time":"2026-02-20T12:34:22.15817547-06:00","stop-time":"2026-02-20T12:34:22.81876478-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":643798008}],"start-time":"2026-02-20T22:59:22.160323812-06:00","stop-time":"2026-02-20T22:59:22.80412183-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":592433191}],"start-time":"2026-02-21T00:54:22.1580623-06:00","stop-time":"2026-02-21T00:54:22.750495482-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":620843484}],"start-time":"2026-02-21T08:14:22.158091379-06:00","stop-time":"2026-02-21T08:14:22.778934856-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":638537489}],"start-time":"2026-02-21T13:24:22.158088787-06:00","stop-time":"2026-02-21T13:24:22.796626267-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":687202955}],"start-time":"2026-02-21T20:04:22.158045109-06:00","stop-time":"2026-02-21T20:04:22.845248062-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":659190399}],"start-time":"2026-02-22T05:09:22.15813119-06:00","stop-time":"2026-02-22T05:09:22.817321586-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":629501560}],"start-time":"2026-02-22T10:39:22.158101323-06:00","stop-time":"2026-02-22T10:39:22.78760289-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":696417420}],"start-time":"2026-02-22T12:49:22.177368196-06:00","stop-time":"2026-02-22T12:49:22.873785609-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":618536424}],"start-time":"2026-02-22T19:49:22.15814476-06:00","stop-time":"2026-02-22T19:49:22.776682035-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":711697326}],"start-time":"2026-02-23T02:39:22.158417854-06:00","stop-time":"2026-02-23T02:39:22.870115181-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":673537305}],"start-time":"2026-02-23T09:59:22.159509858-06:00","stop-time":"2026-02-23T09:59:22.83304716-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1059436925}],"start-time":"2026-02-23T13:29:22.159385589-06:00","stop-time":"2026-02-23T13:29:23.218822504-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":796381677}],"start-time":"2026-02-23T19:09:22.158055649-06:00","stop-time":"2026-02-23T19:09:22.954437311-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1068903851}],"start-time":"2026-02-24T00:59:22.158435433-06:00","stop-time":"2026-02-24T00:59:23.227339283-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":297655649},{"label":"write-catalogs","summary":"query store for catalogs","duration":969424650}],"start-time":"2026-02-24T06:44:22.158251923-06:00","stop-time":"2026-02-24T06:44:23.437352511-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":703459792}],"start-time":"2026-02-24T09:59:22.187621696-06:00","stop-time":"2026-02-24T09:59:22.891081473-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":695196236}],"start-time":"2026-02-24T17:09:22.158378391-06:00","stop-time":"2026-02-24T17:09:22.853574632-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":644837744}],"start-time":"2026-02-24T23:19:22.158554144-06:00","stop-time":"2026-02-24T23:19:22.803391829-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":727659435}],"start-time":"2026-02-25T00:24:22.158406652-06:00","stop-time":"2026-02-25T00:24:22.886066097-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":695553522}],"start-time":"2026-02-25T06:54:22.158088326-06:00","stop-time":"2026-02-25T06:54:22.853641838-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":723939604}],"start-time":"2026-02-25T15:44:22.158284277-06:00","stop-time":"2026-02-25T15:44:22.882223866-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":735139155}],"start-time":"2026-02-25T22:29:22.159259129-06:00","stop-time":"2026-02-25T22:29:22.894398266-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":714511670}],"start-time":"2026-02-26T05:54:22.158051008-06:00","stop-time":"2026-02-26T05:54:22.872562726-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":659769612}],"start-time":"2026-02-26T07:44:22.158032095-06:00","stop-time":"2026-02-26T07:44:22.817801719-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":3756421956}],"start-time":"2026-02-26T13:54:22.158323353-06:00","stop-time":"2026-02-26T13:54:25.914745303-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":643260288}],"start-time":"2026-02-26T23:34:22.158002151-06:00","stop-time":"2026-02-26T23:34:22.801262424-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":706290404}],"start-time":"2026-02-27T02:24:22.158025613-06:00","stop-time":"2026-02-27T02:24:22.864316027-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1004974024}],"start-time":"2026-02-27T09:39:22.25441286-06:00","stop-time":"2026-02-27T09:39:23.259386886-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":739146637}],"start-time":"2026-02-27T12:39:22.169827379-06:00","stop-time":"2026-02-27T12:39:22.908974014-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":698850309}],"start-time":"2026-02-27T23:04:22.15811113-06:00","stop-time":"2026-02-27T23:04:22.856961432-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":593756679}],"start-time":"2026-02-28T04:29:22.158434634-06:00","stop-time":"2026-02-28T04:29:22.7521913-06:00"}]},"changes":{},"tasks":{},"last-change-id":180,"last-task-id":3910,"last-lane-id":183,"last-notice-id":66,"last-notice-timestamp":"2026-02-19T05:49:27.511040542Z"}