(test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Jul 19 04:30:49 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 04:30:49.9216 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Jul 19 04:30:50 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 04:30:49.9627 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Jul 19 04:30:50 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: #011status code: 400, request id: 2ae1156d-d7b9-40fe-863d-c29e0965665c Jul 19 04:39:01 ip-172-31-29-215 CRON[2898590]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Jul 19 04:39:19 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Jul 19 04:39:19 ip-172-31-29-215 sessionclean[2898603]: Cannot load Xdebug - it was already loaded Jul 19 04:39:19 ip-172-31-29-215 sessionclean[2898603]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Jul 19 04:39:19 ip-172-31-29-215 sessionclean[2898603]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Jul 19 04:39:19 ip-172-31-29-215 sessionclean[2898603]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Jul 19 04:39:19 ip-172-31-29-215 sessionclean[2898603]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Jul 19 04:39:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Jul 19 04:39:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Jul 19 04:40:01 ip-172-31-29-215 CRON[2898672]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Jul 19 05:00:01 ip-172-31-29-215 CRON[2898705]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Jul 19 05:00:08 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 05:00:08.0403 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Jul 19 05:00:08 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 05:00:08.0841 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Jul 19 05:00:08 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: #011status code: 400, request id: e54a5ec7-e0dd-4015-80a2-37f30d594dc3 Jul 19 05:09:01 ip-172-31-29-215 CRON[2898730]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Jul 19 05:09:03 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Jul 19 05:09:03 ip-172-31-29-215 sessionclean[2898744]: Cannot load Xdebug - it was already loaded Jul 19 05:09:03 ip-172-31-29-215 sessionclean[2898744]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrvsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Jul 19 07:09:19 ip-172-31-29-215 sessionclean[2899487]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Jul 19 07:09:19 ip-172-31-29-215 sessionclean[2899487]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Jul 19 07:09:19 ip-172-31-29-215 sessionclean[2899487]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Jul 19 07:09:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Jul 19 07:09:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Jul 19 07:17:01 ip-172-31-29-215 CRON[2899559]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly) Jul 19 07:20:01 ip-172-31-29-215 CRON[2899564]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Jul 19 07:21:10 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 07:21:10.5263 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Jul 19 07:21:10 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 07:21:10.5690 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Jul 19 07:21:10 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: #011status code: 400, request id: 0f07bb57-4a55-4f76-9b48-1175ba493541 Jul 19 07:39:01 ip-172-31-29-215 CRON[2899599]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Jul 19 07:39:06 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Jul 19 07:39:06 ip-172-31-29-215 sessionclean[2899612]: Cannot load Xdebug - it was already loaded Jul 19 07:39:06 ip-172-31-29-215 sessionclean[2899612]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Jul 19 07:39:06 ip-172-31-29-215 sessionclean[2899612]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Jul 19 07:39:06 ip-172-31-29-215 sessionclean[2899612]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Jul 19 07:39:06 ip-172-31-29-215 sessionclean[2899612]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Jul 19 07:39:06 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Jul 19 07:39:06 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Jul 19 07:40:01 ip-172-31-29-215 CRON[2899682]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Jul 19 07:41:35 ip-172-31-29-215 systemd[1]: fwupd.service: Succeeded. Jul 19 07:48:48 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 07:48:48.5712 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Jul 19 07:48:48 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 07:48:48.6093 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Jul 19 07:48:48 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: #011status code: 400, request id: bdf8c394-b34b-4223-ba69 09:39:14 ip-172-31-29-215 sessionclean[2900156]: Cannot load Xdebug - it was already loaded Jul 19 09:39:14 ip-172-31-29-215 sessionclean[2900156]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Jul 19 09:39:14 ip-172-31-29-215 sessionclean[2900156]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Jul 19 09:39:14 ip-172-31-29-215 sessionclean[2900156]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Jul 19 09:39:14 ip-172-31-29-215 sessionclean[2900156]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Jul 19 09:39:14 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Jul 19 09:39:14 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Jul 19 09:40:01 ip-172-31-29-215 CRON[2900226]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Jul 19 09:41:56 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 09:41:56.8166 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Jul 19 09:41:56 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 09:41:56.8548 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Jul 19 09:41:56 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: #011status code: 400, request id: b04a1195-9d46-47f5-81dc-4d881d54c8d1 Jul 19 10:00:01 ip-172-31-29-215 CRON[2900255]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Jul 19 10:09:01 ip-172-31-29-215 CRON[2900285]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Jul 19 10:09:19 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Jul 19 10:09:19 ip-172-31-29-215 sessionclean[2900298]: Cannot load Xdebug - it was already loaded Jul 19 10:09:19 ip-172-31-29-215 sessionclean[2900298]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Jul 19 10:09:19 ip-172-31-29-215 sessionclean[2900298]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Jul 19 10:09:19 ip-172-31-29-215 sessionclean[2900298]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Jul 19 10:09:19 ip-172-31-29-215 sessionclean[2900298]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Jul 19 10:09:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Jul 19 10:09:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Jul 19 10:10:47 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 10:10:47.8563 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Jul 19 10:10:47 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[1875640]: 2025-07-19 10:10:47.8987 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: A{"data":{"auth":{"last-id":0,"users":null,"device":{"brand":"canonical","model":"aws-classic","serial":"d54ba04a-695c-4c8a-80be-19b0df80cf46","key-id":"iJU_vyejSQtLnAQVmtHHq9RX72Jb40JMWVv9GgpJ6311Gr12A8_tSCoURR6sJoZ0","session-macaroon":"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_OfWL4TgaWZ0o2jKYAo"}},"config":{"core":{"cloud":{"availability-zone":"us-east-2b","name":"aws","region":"us-east-2"},"refresh":{},"seed":{"loaded":true}}},"conns":{"lxd:lxd-support core:lxd-support":{"auto":true,"interface":"lxd-support"},"lxd:network core:network":{"auto":true,"interface":"network"},"lxd:network-bind core:network-bind":{"auto":true,"interface":"network-bind"},"lxd:system-observe core:system-observe":{"auto":true,"interface":"system-observe"}},"last-refresh":"2025-07-19T20:18:52.708932935-06:00","last-refresh-hints":"2021-04-23T00:34:45.749036127Z","patch-level":6,"patch-sublevel":3,"patch-sublevel-last-version":"2.70","preseed-start-time":"2021-02-23T23:49:58.007053445Z","preseed-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"preseed-time":"2021-02-23T23:50:04.446239096Z","preseeded":true,"refresh-candidates":{},"refresh-privacy-key":"g704FHcv0Pckm3nj","seed-restart-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"seed-restart-time":"2021-04-23T00:34:45.451530228Z","seed-time":"2021-04-23T00:34:48.134686428Z","seeded":true,"seeded-systems":[{"system":"","model":"aws-classic","brand-id":"canonical","revision":0,"timestamp":"2018-03-28T00:00:00Z","seed-time":"2021-04-23T00:34:48.134686428Z"}],"snap-cookies":{"5e51KAapWFH2S6Pq1_k5pj38kDCJfBGZwj4Lccy9-4ZzKV4QK38Q":"core22","9Ik8_T1g-vkB36qtEVtFHQ26GEq_1MVDiz64viTuob-kh7QJ-bXp":"core18","EgCCiF-EA1LESrzE6f7eWTsNNarEnFo4zqZZpgEm0KEs24FOYGDp":"snapd","MCsSyQl6v8ejlpGpqXRE4xUuBmjFcy7BylqrohPSDnR2hEgomXrT":"core20","plf6ZN7S7plAWwR473QRPz37i90mVRnKUR7Q6hYe4Ja1rFrT7wqj":"lxd","qJXNu_kWACy61RpAISymmAAH01SCjAM7rFrMKIMjCjTTeTWvkFng":"amazon-ssm-agent"},"snapd-snap-cve-2021-44731-vuln-removed":true,"snapd-snap-cve-2022-3328-vuln-removed":true,"snaps":{"amazon-ssm-agent":{"type":"app","sequence":[{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"9881","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."},{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"11320","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."}],"active":true,"current":"11320","channel":"latest/stable/ubuntu-20.04","classic":true,"aliases":{"ssm-cli":{"auto":"ssm-cli"}},"last-refresh-time":"2025-04-17T18:13:34.366980885-06:00"},"core18":{"type":"base","sequence":[{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2887","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2923","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2923","channel":"latest/stable","last-refresh-time":"2025-07-17T04:13:56.471139377-06:00"},"core20":{"type":"base","sequence":[{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2582","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2599","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2599","channel":"latest/stable","last-refresh-time":"2025-06-13T03:58:36.824188492-06:00"},"core22":{"type":"base","sequence":[{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"2010","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"2045","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2045","channel":"latest/stable","last-refresh-time":"2025-07-10T14:38:56.081810214-06:00"},"lxd":{"type":"app","sequence":[{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"29619","channel":"4.0/stable","links":{"contact":["https://github.com/canonical/lxd/issues"],"website":["https://ubuntu.com/lxd"]},"contact":"https://github.com/canonical/lxd/issues","title":"LXD","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - lxcfs.debug: Increase logging to debug level [default=false]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - ui.enable: Enable the web interface [default=false]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"},{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"32662","channel":"4.0/stable","links":{"contact":["mailto:lxd@lists.canonical.com"],"issues":["https://github.com/canonical/lxd/issues"],"source":["https://github.com/canonical/lxd"],"website":["https://ubuntu.com/lxd"]},"contact":"mailto:lxd@lists.canonical.com","title":"LXD","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - apparmor.unprivileged-restrictions-disable: Whether to disable restrictions on unprivileged user namespaces [default=true]\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - lxcfs.debug: Increase logging to debug level [default=false]\n - minio.path: Path to the directory containing the minio and mc binaries to use with LXD [default=\"\"]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - ui.enable: Enable the web interface [default=true]\n - zfs.external: Use the system's ZFS tools [default=false]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"}],"active":true,"current":"32662","channel":"4.0/stable/ubuntu-20.04","aliases":{"lxc":{"auto":"lxc"}},"last-refresh-time":"2025-03-10T22:03:29.704949351-06:00"},"snapd":{"type":"snapd","sequence":[{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"24718","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."},{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"24792","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."}],"active":true,"current":"24792","channel":"latest/stable","required":true,"last-refresh-time":"2025-07-08T16:48:46.259659594-06:00"}},"start-of-operation-time":"2021-04-23T00:34:45.630907428Z","timings":[{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":725233387}],"start-time":"2025-07-01T12:23:42.989697764-06:00","stop-time":"2025-07-01T12:23:43.714931151-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1139573127}],"start-time":"2025-07-01T22:13:42.988201525-06:00","stop-time":"2025-07-01T22:13:44.127774652-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":677968750}],"start-time":"2025-07-02T01:08:42.988430841-06:00","stop-time":"2025-07-02T01:08:43.66639959-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":743030133}],"start-time":"2025-07-02T06:53:42.98957868-06:00","stop-time":"2025-07-02T06:53:43.732608793-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":654303766}],"start-time":"2025-07-02T15:38:43.000150704-06:00","stop-time":"2025-07-02T15:38:43.654454467-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":633807416}],"start-time":"2025-07-02T18:23:42.999447011-06:00","stop-time":"2025-07-02T18:23:43.63325439-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":287385358},{"label":"write-catalogs","summary":"query store for catalogs","duration":824970405}],"start-time":"2025-07-02T19:13:42.988369704-06:00","stop-time":"2025-07-02T19:13:44.110968556-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":736887170}],"start-time":"2025-07-03T03:58:42.988055912-06:00","stop-time":"2025-07-03T03:58:43.724943081-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":684820505}],"start-time":"2025-07-03T08:43:42.988223799-06:00","stop-time":"2025-07-03T08:43:43.673044297-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":681071630}],"start-time":"2025-07-03T15:23:42.990355452-06:00","stop-time":"2025-07-03T15:23:43.671427078-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":297027949},{"label":"write-catalogs","summary":"query store for catalogs","duration":762818054}],"start-time":"2025-07-03T19:13:43.08786603-06:00","stop-time":"2025-07-03T19:13:44.158554795-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":695278512}],"start-time":"2025-07-03T22:28:42.988064158-06:00","stop-time":"2025-07-03T22:28:43.683342667-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":737955304}],"start-time":"2025-07-04T02:58:42.98973263-06:00","stop-time":"2025-07-04T02:58:43.727687942-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":681769019}],"start-time":"2025-07-04T07:53:42.988945129-06:00","stop-time":"2025-07-04T07:53:43.670714142-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":615353109}],"start-time":"2025-07-04T16:13:42.988862831-06:00","stop-time":"2025-07-04T16:13:43.604215932-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":273656190},{"label":"write-catalogs","summary":"query store for catalogs","duration":771135505}],"start-time":"2025-07-04T19:18:42.98891962-06:00","stop-time":"2025-07-04T19:18:44.043809171-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":620425573}],"start-time":"2025-07-04T20:13:42.988147931-06:00","stop-time":"2025-07-04T20:13:43.608573498-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":636356306}],"start-time":"2025-07-05T00:58:42.992592286-06:00","stop-time":"2025-07-05T00:58:43.628948592-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":626125382}],"start-time":"2025-07-05T09:08:42.988108007-06:00","stop-time":"2025-07-05T09:08:43.614233385-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":613208114}],"start-time":"2025-07-05T13:58:42.987988796-06:00","stop-time":"2025-07-05T13:58:43.60119687-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":300754298},{"label":"write-catalogs","summary":"query store for catalogs","duration":852370622}],"start-time":"2025-07-05T19:23:42.988906954-06:00","stop-time":"2025-07-05T19:23:44.153917361-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":672868530}],"start-time":"2025-07-05T23:13:42.988161654-06:00","stop-time":"2025-07-05T23:13:43.661030184-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":629820856}],"start-time":"2025-07-06T04:28:42.988068004-06:00","stop-time":"2025-07-06T04:28:43.617888864-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":579870370}],"start-time":"2025-07-06T09:58:42.988420635-06:00","stop-time":"2025-07-06T09:58:43.568290998-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":641166659}],"start-time":"2025-07-06T16:18:42.988072065-06:00","stop-time":"2025-07-06T16:18:43.629238713-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":636710297}],"start-time":"2025-07-06T18:53:42.988148185-06:00","stop-time":"2025-07-06T18:53:43.624858474-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1154820591}],"start-time":"2025-07-07T01:08:43.06306637-06:00","stop-time":"2025-07-07T01:08:44.217886952-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":841843938}],"start-time":"2025-07-07T10:43:42.988844812-06:00","stop-time":"2025-07-07T10:43:43.830688742-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":678581774}],"start-time":"2025-07-07T15:28:42.988288505-06:00","stop-time":"2025-07-07T15:28:43.666870265-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":711823894}],"start-time":"2025-07-07T19:03:42.988568414-06:00","stop-time":"2025-07-07T19:03:43.700392309-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":862139523}],"start-time":"2025-07-08T02:03:43.017960024-06:00","stop-time":"2025-07-08T02:03:43.880099556-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":671214168}],"start-time":"2025-07-08T06:13:43.017728518-06:00","stop-time":"2025-07-08T06:13:43.688942691-06:00"},{"tags":{"change-id":"153","ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":698519283}],"start-time":"2025-07-08T16:48:43.015523202-06:00","stop-time":"2025-07-08T16:48:43.714042469-06:00"},{"tags":{"change-id":"153","task-id":"3321","task-kind":"download-snap","task-status":"Doing"},"timings":[{"label":"download","summary":"download snap \"snapd\"","duration":1155030231}],"start-time":"2025-07-08T16:48:43.756848779-06:00","stop-time":"2025-07-08T16:48:44.911879003-06:00"},{"tags":{"change-id":"153","task-id":"3323","task-kind":"mount-snap","task-status":"Doing"},"timings":[{"label":"check-snap","summary":"check snap \"snapd\"","duration":25273446},{"label":"setup-snap","summary":"setup snap \"snapd\"","duration":291763106}],"start-time":"2025-07-08T16:48:45.547987946-06:00","stop-time":"2025-07-08T16:48:45.865027617-06:00"},{"tags":{"change-id":"153","task-id":"3329","task-kind":"setup-profiles","task-status":"Doing"},"timings":[{"label":"setup-security-backend[many]","summary":"setup security backend \"apparmor\" for 2 snaps","duration":151481163},{"level":1,"label":"load-profiles[unchanged-many]","summary":"load unchanged security profiles 2 snaps","duration":54565517}],"start-time":"2025-07-08T16:48:46.068825462-06:00","stop-time":"2025-07-08T16:48:46.232349727-06:00"},{"tags":{"change-id":"153","task-id":"3330","task-kind":"link-snap","task-status":"Doing"},"start-time":"2025-07-08T16:48:46.255867525-06:00","stop-time":"2025-07-08T16:48:46.255870413-06:00"},{"tags":{"startup":"ifacemgr"},"timings":[{"label":"setup-security-backend","summary":"setup security backend \"seccomp\" for snap \"lxd\"","duration":72822340},{"label":"setup-security-backend","summary":"setup security backend \"seccomp\" for snap \"amazon-ssm-agent\"","duration":15562502},{"label":"setup-security-backend","summary":"setup security backend \"mount\" for snap \"lxd\"","duration":223150682},{"label":"setup-security-backend[many]","summary":"setup security backend \"apparmor\" for 6 snaps","duration":929757462},{"level":1,"label":"load-profiles[changed-many]","summary":"load changed security profiles of 6 snaps","duration":753734747},{"level":1,"label":"load-profiles[unchanged-many]","summary":"load unchanged security profiles 6 snaps","duration":103546767}],"start-time":"2025-07-08T16:48:50.839818994-06:00","stop-time":"2025-07-08T16:48:52.091953421-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":316135589},{"label":"write-catalogs","summary":"query store for catalogs","duration":780188182}],"start-time":"2025-07-08T16:48:52.186392164-06:00","stop-time":"2025-07-08T16:48:53.286681113-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":720702456}],"start-time":"2025-07-08T23:23:52.118865934-06:00","stop-time":"2025-07-08T23:23:52.839568375-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":768162313}],"start-time":"2025-07-09T03:38:52.113825464-06:00","stop-time":"2025-07-09T03:38:52.881987779-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":674800064}],"start-time":"2025-07-09T09:48:52.113771267-06:00","stop-time":"2025-07-09T09:48:52.788571335-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":659841202}],"start-time":"2025-07-09T15:08:52.114144247-06:00","stop-time":"2025-07-09T15:08:52.77398544-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":312530927},{"label":"write-catalogs","summary":"query store for catalogs","duration":776612424}],"start-time":"2025-07-09T16:53:52.114025468-06:00","stop-time":"2025-07-09T16:53:53.21399489-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":721860110}],"start-time":"2025-07-09T21:33:52.114171068-06:00","stop-time":"2025-07-09T21:33:52.836031229-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":737843395}],"start-time":"2025-07-10T04:13:52.11397305-06:00","stop-time":"2025-07-10T04:13:52.851816445-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":777913098}],"start-time":"2025-07-10T09:13:52.11517254-06:00","stop-time":"2025-07-10T09:13:52.893085626-06:00"},{"tags":{"change-id":"154","ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":680536513}],"start-time":"2025-07-10T14:38:52.113907906-06:00","stop-time":"2025-07-10T14:38:52.794444414-06:00"},{"tags":{"change-id":"154","task-id":"3342","task-kind":"download-snap","task-status":"Doing"},"timings":[{"label":"download","summary":"download snap \"core22\"","duration":1022851551},{"label":"download-icon","summary":"download snap icon for \"core22\"","duration":463349092}],"start-time":"2025-07-10T14:38:52.839072341-06:00","stop-time":"2025-07-10T14:38:54.325284441-06:00"},{"tags":{"change-id":"154","task-id":"3344","task-kind":"mount-snap","task-status":"Doing"},"timings":[{"label":"check-snap","summary":"check snap \"core22\"","duration":293166946},{"label":"setup-snap","summary":"setup snap \"core22\"","duration":338144545}],"start-time":"2025-07-10T14:38:55.154234466-06:00","stop-time":"2025-07-10T14:38:55.78554979-06:00"},{"tags":{"change-id":"154","task-id":"3350","task-kind":"setup-profiles","task-status":"Doing"},"start-time":"2025-07-10T14:38:56.05759198-06:00","stop-time":"2025-07-10T14:38:56.05818166-06:00"},{"tags":{"change-id":"154","task-id":"3351","task-kind":"link-snap","task-status":"Doing"},"start-time":"2025-07-10T14:38:56.077017824-06:00","stop-time":"2025-07-10T14:38:56.07818098-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":325445212},{"label":"write-catalogs","summary":"query store for catalogs","duration":766714583}],"start-time":"2025-07-10T16:53:52.114089311-06:00","stop-time":"2025-07-10T16:53:53.217809656-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":603555420}],"start-time":"2025-07-10T21:33:52.115444307-06:00","stop-time":"2025-07-10T21:33:52.71899973-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":788914980}],"start-time":"2025-07-11T05:38:52.113781082-06:00","stop-time":"2025-07-11T05:38:52.902696066-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":705699000}],"start-time":"2025-07-11T09:48:52.113810716-06:00","stop-time":"2025-07-11T09:48:52.819509732-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":737595410}],"start-time":"2025-07-11T14:48:52.122657031-06:00","stop-time":"2025-07-11T14:48:52.86025243-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":278515834},{"label":"write-catalogs","summary":"query store for catalogs","duration":717703712}],"start-time":"2025-07-11T16:58:52.113929078-06:00","stop-time":"2025-07-11T16:58:53.13680919-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":579358251}],"start-time":"2025-07-11T19:58:52.195476647-06:00","stop-time":"2025-07-11T19:58:52.774834917-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1045205459}],"start-time":"2025-07-12T04:08:52.11407915-06:00","stop-time":"2025-07-12T04:08:53.159284603-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":617685992}],"start-time":"2025-07-12T11:33:52.11405154-06:00","stop-time":"2025-07-12T11:33:52.731737534-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":596758052}],"start-time":"2025-07-12T15:28:52.113773109-06:00","stop-time":"2025-07-12T15:28:52.710531217-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":291183881},{"label":"write-catalogs","summary":"query store for catalogs","duration":741907087}],"start-time":"2025-07-12T16:58:52.114800023-06:00","stop-time":"2025-07-12T16:58:53.159502899-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":631739305}],"start-time":"2025-07-12T18:43:52.113887764-06:00","stop-time":"2025-07-12T18:43:52.745627085-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":881676311}],"start-time":"2025-07-13T01:13:52.114175503-06:00","stop-time":"2025-07-13T01:13:52.995851812-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":644398439}],"start-time":"2025-07-13T09:38:52.113794321-06:00","stop-time":"2025-07-13T09:38:52.758192766-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":619011013}],"start-time":"2025-07-13T14:58:52.113852998-06:00","stop-time":"2025-07-13T14:58:52.732863995-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":278825776},{"label":"write-catalogs","summary":"query store for catalogs","duration":729299437}],"start-time":"2025-07-13T17:03:52.113933279-06:00","stop-time":"2025-07-13T17:03:53.132190329-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":663611235}],"start-time":"2025-07-13T21:03:52.114280778-06:00","stop-time":"2025-07-13T21:03:52.777892009-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":683238992}],"start-time":"2025-07-14T01:58:52.11376201-06:00","stop-time":"2025-07-14T01:58:52.797001006-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":650580592}],"start-time":"2025-07-14T06:08:52.113813709-06:00","stop-time":"2025-07-14T06:08:52.764394292-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":648277899}],"start-time":"2025-07-14T15:48:52.113795942-06:00","stop-time":"2025-07-14T15:48:52.762073844-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":675466326}],"start-time":"2025-07-14T23:28:52.113897902-06:00","stop-time":"2025-07-14T23:28:52.789364248-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":728418730}],"start-time":"2025-07-15T03:13:52.113812128-06:00","stop-time":"2025-07-15T03:13:52.842230852-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":708504136}],"start-time":"2025-07-15T07:33:52.113812132-06:00","stop-time":"2025-07-15T07:33:52.822316258-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":617957179}],"start-time":"2025-07-15T14:23:52.113989433-06:00","stop-time":"2025-07-15T14:23:52.731946605-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":286902473},{"label":"write-catalogs","summary":"query store for catalogs","duration":762917014}],"start-time":"2025-07-15T17:08:52.114593285-06:00","stop-time":"2025-07-15T17:08:53.174624107-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":605864255}],"start-time":"2025-07-15T19:38:52.113999387-06:00","stop-time":"2025-07-15T19:38:52.719863627-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":713448898}],"start-time":"2025-07-16T01:28:52.113773905-06:00","stop-time":"2025-07-16T01:28:52.827222815-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":673138480}],"start-time":"2025-07-16T08:33:52.140991466-06:00","stop-time":"2025-07-16T08:33:52.81412995-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":628542299}],"start-time":"2025-07-16T12:33:52.137792524-06:00","stop-time":"2025-07-16T12:33:52.766334835-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":666756215}],"start-time":"2025-07-16T18:03:52.114306379-06:00","stop-time":"2025-07-16T18:03:52.781062594-06:00"},{"tags":{"change-id":"155","ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1197099961}],"start-time":"2025-07-17T04:13:52.113817082-06:00","stop-time":"2025-07-17T04:13:53.310917047-06:00"},{"tags":{"change-id":"155","task-id":"3363","task-kind":"download-snap","task-status":"Doing"},"timings":[{"label":"download","summary":"download snap \"core18\"","duration":1098803430},{"label":"download-icon","summary":"download snap icon for \"core18\"","duration":479279542}],"start-time":"2025-07-17T04:13:53.356365825-06:00","stop-time":"2025-07-17T04:13:54.934904128-06:00"},{"tags":{"change-id":"155","task-id":"3365","task-kind":"mount-snap","task-status":"Doing"},"timings":[{"label":"check-snap","summary":"check snap \"core18\"","duration":224659606},{"label":"setup-snap","summary":"setup snap \"core18\"","duration":332370453}],"start-time":"2025-07-17T04:13:55.644310863-06:00","stop-time":"2025-07-17T04:13:56.201344732-06:00"},{"tags":{"change-id":"155","task-id":"3371","task-kind":"setup-profiles","task-status":"Doing"},"start-time":"2025-07-17T04:13:56.445251397-06:00","stop-time":"2025-07-17T04:13:56.445820627-06:00"},{"tags":{"change-id":"155","task-id":"3372","task-kind":"link-snap","task-status":"Doing"},"start-time":"2025-07-17T04:13:56.465381663-06:00","stop-time":"2025-07-17T04:13:56.466383873-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":728311405}],"start-time":"2025-07-17T11:18:52.115855955-06:00","stop-time":"2025-07-17T11:18:52.844167361-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":675068859}],"start-time":"2025-07-17T12:53:52.113845699-06:00","stop-time":"2025-07-17T12:53:52.788914553-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":275508081},{"label":"write-catalogs","summary":"query store for catalogs","duration":819145989}],"start-time":"2025-07-17T17:18:52.113995579-06:00","stop-time":"2025-07-17T17:18:53.220788331-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":652647943}],"start-time":"2025-07-17T22:58:52.113785537-06:00","stop-time":"2025-07-17T22:58:52.766433471-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":629744580}],"start-time":"2025-07-18T04:28:52.113755804-06:00","stop-time":"2025-07-18T04:28:52.743500382-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":782886130}],"start-time":"2025-07-18T09:18:52.113954895-06:00","stop-time":"2025-07-18T09:18:52.896841025-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":702938378}],"start-time":"2025-07-18T14:38:52.113761078-06:00","stop-time":"2025-07-18T14:38:52.816699457-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":597904896}],"start-time":"2025-07-18T20:38:52.113779615-06:00","stop-time":"2025-07-18T20:38:52.711684509-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":583841610}],"start-time":"2025-07-19T05:23:52.11421924-06:00","stop-time":"2025-07-19T05:23:52.698060837-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":607115830}],"start-time":"2025-07-19T09:33:52.113863721-06:00","stop-time":"2025-07-19T09:33:52.720979546-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":866584050}],"start-time":"2025-07-19T13:58:52.113772631-06:00","stop-time":"2025-07-19T13:58:52.980356682-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":268318250},{"label":"write-catalogs","summary":"query store for catalogs","duration":801635918}],"start-time":"2025-07-19T17:23:52.114152325-06:00","stop-time":"2025-07-19T17:23:53.195794837-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":595554956}],"start-time":"2025-07-19T20:18:52.113770253-06:00","stop-time":"2025-07-19T20:18:52.709325205-06:00"}]},"changes":{},"tasks":{},"notices":[{"id":"41","user-id":null,"type":"change-update","key":"155","first-occurred":"2025-07-17T10:13:53.310910232Z","last-occurred":"2025-07-17T10:13:57.113120354Z","last-repeated":"2025-07-17T10:13:57.113120354Z","occurrences":3,"last-data":{"kind":"auto-refresh"},"expire-after":"168h0m0s"}],"last-change-id":155,"last-task-id":3382,"last-lane-id":158,"last-notice-id":41,"last-notice-timestamp":"2025-07-17T04:13:57.113120354-06:00"}