immauss / openvas

Containers for running the Greenbone Vulnerability Manager. Run as a single container with all services or separate single applications containers via docker-compose.
GNU Affero General Public License v3.0
354 stars 102 forks source link

Task Stopped at 0% but still running in the backgrund. #98

Closed DRIgnazGortngschirl closed 2 years ago

DRIgnazGortngschirl commented 2 years ago

Using the latest docker image there seeems to be a issues with starting the scans as the are requested go imediatly in the state stoped even do the vulnerability scan starts in the backend.

System resources: 8 Cores 32 GB RAM 64 GB SSD Disk

openvas    | Waiting for gvmd
openvas    | Waiting for gvmd
openvas    | Waiting for gvmd
openvas    | Waiting for gvmd
openvas    | Waiting for gvmd
openvas    | Waiting for gvmd
openvas    | Waiting for gvmd
openvas    | admin
openvas    | Time to fixup the gvm accounts.
openvas    | Setting admin password
openvas    | reset 
openvas    | Starting Postfix for report delivery by email
openvas    | Starting Postfix Mail Transport Agent: postfix.
openvas    | Starting Open Scanner Protocol daemon for OpenVAS...
openvas    | Starting Greenbone Security Assistant...
openvas    | Oops, secure memory pool already initialized
openvas    | gsad main-Message: 09:00:26.005: Starting GSAD version 21.4.3
openvas    | 
openvas    | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
openvas    | + Your GVM/openvas/postgresql container is now ready to use! +
openvas    | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
openvas    | 
openvas    | gvmd --version
openvas    | Greenbone Vulnerability Manager 21.4.4
openvas    | Manager DB revision 242
openvas    | Copyright (C) 2009-2021 Greenbone Networks GmbH
openvas    | License: AGPL-3.0-or-later
openvas    | This is free software: you are free to change and redistribute it.
openvas    | There is NO WARRANTY, to the extent permitted by law.
openvas    | 
openvas    | Image DB date:
openvas    | Tue Nov 30 19:52:49 UTC 2021
openvas    | Versions:
openvas    | gvmd=v21.4.4
openvas    | openvas=v21.4.3
openvas    | openvas_smb=v21.4.0
openvas    | gvm_libs=v21.4.3
openvas    | gsa=v21.4.3
openvas    | ospd=v21.4.4
openvas    | ospd_openvas=v21.4.3
openvas    | python_gvm=v21.10.0
openvas    | gvm_tools=v21.10.0
openvas    | ++++++++++++++++
openvas    | + Tailing logs +
openvas    | ++++++++++++++++
openvas    | ==> /usr/local/var/log/gvm/gsad.log <==
openvas    | gsad  gmp:MESSAGE:2021-09-07 12h14.06 utc:1287: Authentication success for 'admin' from 172.18.0.1
openvas    | gsad main:MESSAGE:2021-09-07 12h21.23 utc:1329: Starting GSAD version 21.4.1~dev1
openvas    | gsad  gmp:MESSAGE:2021-09-07 12h21.47 utc:1330: Authentication success for 'admin' from 172.18.0.1
openvas    | gsad  gmp:MESSAGE:2021-09-07 12h47.11 GMT:1330: Authentication success for 'admin' from 172.18.0.1
openvas    | gsad  gmp:MESSAGE:2021-09-07 13h46.44 GMT:1330: Authentication success for 'admin' from 172.18.0.1
openvas    | gsad main:MESSAGE:2021-10-06 07h18.24 utc:923: Starting GSAD version 21.4.1~dev1
openvas    | gsad  gmp:MESSAGE:2021-10-06 07h18.39 utc:924: Authentication success for 'admin' from 172.18.0.1
openvas    | gsad main:MESSAGE:2021-11-05 08h04.15 utc:921: Starting GSAD version 21.4.1~dev1
openvas    | gsad main:MESSAGE:2021-11-05 08h37.14 utc:360: Starting GSAD version 21.4.3
openvas    | gsad main:MESSAGE:2021-12-03 14h14.36 utc:383: Starting GSAD version 21.4.3
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/gvmd.log <==
openvas    | md   main:MESSAGE:2022-02-08 08h59.10 utc:479:    Greenbone Vulnerability Manager version 21.4.4 (DB revision 242)
openvas    | md   main:WARNING:2022-02-08 08h59.10 utc:479: gvmd: Another process is busy starting up
openvas    | md   main:MESSAGE:2022-02-08 08h59.11 utc:483:    Greenbone Vulnerability Manager version 21.4.4 (DB revision 242)
openvas    | md   main:WARNING:2022-02-08 08h59.11 utc:483: gvmd: Another process is busy starting up
openvas    | md   main:MESSAGE:2022-02-08 08h59.12 utc:487:    Greenbone Vulnerability Manager version 21.4.4 (DB revision 242)
openvas    | md   main:WARNING:2022-02-08 08h59.12 utc:487: gvmd: Another process is busy starting up
openvas    | md   main:MESSAGE:2022-02-08 08h59.13 utc:492:    Greenbone Vulnerability Manager version 21.4.4 (DB revision 242)
openvas    | md manage:   INFO:2022-02-08 08h59.13 utc:492:    Getting users.
openvas    | md   main:MESSAGE:2022-02-08 09h00.19 utc:501:    Greenbone Vulnerability Manager version 21.4.4 (DB revision 242)
openvas    | md manage:   INFO:2022-02-08 09h00.19 utc:501:    Modifying user password.
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/openvas.log <==
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1613: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1610: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1660: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1667: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1594: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1744: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1778: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1789: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1811: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 08h56.11 utc:1809: Vulnerability scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 started for host: IP-ADDRESS
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/ospd-openvas.log <==
openvas    | OSPD[629] 2022-02-07 17:00:09,416: INFO: (ospd.command.command) Scan 275e5055-fb23-4a6a-9252-304fb7500a8c added to the queue in position 1.
openvas    | OSPD[629] 2022-02-07 17:00:50,519: INFO: (ospd.ospd) Scan 275e5055-fb23-4a6a-9252-304fb7500a8c has been removed from the queue.
openvas    | OSPD[629] 2022-02-08 08:38:29,449: INFO: (ospd.command.command) Scan 2951f52c-8c93-4085-8d7d-64dbedad230e added to the queue in position 1.
openvas    | OSPD[629] 2022-02-08 08:38:34,504: INFO: (ospd.ospd) Currently 1 queued scans.
openvas    | OSPD[629] 2022-02-08 08:38:34,698: INFO: (ospd.ospd) Starting scan 2951f52c-8c93-4085-8d7d-64dbedad230e.
openvas    | OSPD[617] 2022-02-08 08:45:33,036: INFO: (ospd.main) Starting OSPd OpenVAS version 21.4.4.
openvas    | OSPD[617] 2022-02-08 08:55:26,099: INFO: (ospd.command.command) Scan dc7913fa-6df5-448f-992f-32eb7d8c3c78 added to the queue in position 1.
openvas    | OSPD[617] 2022-02-08 08:55:33,886: INFO: (ospd.ospd) Currently 1 queued scans.
openvas    | OSPD[617] 2022-02-08 08:55:34,085: INFO: (ospd.ospd) Starting scan dc7913fa-6df5-448f-992f-32eb7d8c3c78.
openvas    | OSPD[621] 2022-02-08 09:00:24,980: INFO: (ospd.main) Starting OSPd OpenVAS version 21.4.4.
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/redis-server.log <==
openvas    | 66:M 08 Feb 2022 08:42:22.567 # Server initialized
openvas    | 66:M 08 Feb 2022 08:42:22.567 # WARNING overcommit_memory is set to 0! Background save may fail under low memory condition. To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect.
openvas    | 66:M 08 Feb 2022 08:42:22.567 # WARNING you have Transparent Huge Pages (THP) support enabled in your kernel. This will create latency and memory usage issues with Redis. To fix this issue run the command 'echo never > /sys/kernel/mm/transparent_hugepage/enabled' as root, and add it to your /etc/rc.local in order to retain the setting after a reboot. Redis must be restarted after THP is disabled.
openvas    | 65:C 08 Feb 2022 08:57:09.093 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Oo
openvas    | 65:C 08 Feb 2022 08:57:09.093 # Redis version=5.0.14, bits=64, commit=00000000, modified=0, pid=65, just started
openvas    | 65:C 08 Feb 2022 08:57:09.093 # Configuration loaded
openvas    | 66:M 08 Feb 2022 08:57:09.097 # WARNING: The TCP backlog setting of 511 cannot be enforced because /proc/sys/net/core/somaxconn is set to the lower value of 128.
openvas    | 66:M 08 Feb 2022 08:57:09.098 # Server initialized
openvas    | 66:M 08 Feb 2022 08:57:09.098 # WARNING overcommit_memory is set to 0! Background save may fail under low memory condition. To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect.
openvas    | 66:M 08 Feb 2022 08:57:09.098 # WARNING you have Transparent Huge Pages (THP) support enabled in your kernel. This will create latency and memory usage issues with Redis. To fix this issue run the command 'echo never > /sys/kernel/mm/transparent_hugepage/enabled' as root, and add it to your /etc/rc.local in order to retain the setting after a reboot. Redis must be restarted after THP is disabled.
openvas    | gsad  gmp-Message: 09:01:33.064: Authentication success for 'admin' from 172.18.0.1
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/openvas.log <==
openvas    | libgvm util:MESSAGE:2022-02-08 09h01.34 utc:648: Updated NVT cache from version 0 to 202202071112
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/gvmd.log <==
openvas    | event task:MESSAGE:2022-02-08 09h01.44 UTC:798: Status of task NAME (9007c5a0-8b46-47b8-affa-7a8336f5c295) has changed to Requested
openvas    | event task:MESSAGE:2022-02-08 09h01.44 UTC:798: Task NAME (9007c5a0-8b46-47b8-affa-7a8336f5c295) has been requested to start by admin
openvas    | event task:MESSAGE:2022-02-08 09h01.58 UTC:853: Status of task NAME (9007c5a0-8b46-47b8-affa-7a8336f5c295) has changed to Stopped
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/ospd-openvas.log <==
openvas    | OSPD[621] 2022-02-08 09:02:20,129: INFO: (ospd.command.command) Scan f18383d8-2edd-4fa2-9f9a-19e71f32475f added to the queue in position 1.
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/gvmd.log <==
openvas    | event task:MESSAGE:2022-02-08 09h02.20 UTC:801: Status of task NAME (9007c5a0-8b46-47b8-affa-7a8336f5c295) has changed to Stopped
openvas    | 2022-02-08 09:02:35.383 GMT [721] ERROR:  canceling statement due to user request
openvas    | 2022-02-08 09:02:35.383 GMT [721] CONTEXT:  SQL function "report_severity_count" statement 1
openvas    | 2022-02-08 09:02:35.383 GMT [721] STATEMENT:  SELECT sum(aggregate_count) AS outer_count, EXTRACT (EPOCH FROM           date_trunc ('day',           TIMESTAMP WITH TIME ZONE 'epoch'           + (aggregate_group_value) * INTERVAL '1 second'))  :: integer AS outer_group_column, aggregate_subgroup_value AS outer_subgroup_column , min(aggregate_min_0), max (aggregate_max_0), sum (aggregate_avg_0) / sum(aggregate_count), sum (aggregate_sum_0), min(aggregate_min_1), max (aggregate_max_1), sum (aggregate_avg_1) / sum(aggregate_count), sum (aggregate_sum_1) FROM (WITH permissions_subject     AS (SELECT * FROM permissions         WHERE subject_location               = 0         AND ((subject_type = 'user'               AND subject                   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))              OR (subject_type = 'group'                  AND subject                      IN (SELECT DISTINCT "group"                          FROM group_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e')))              OR (subject_type = 'role'                  AND subject                      IN (SELECT DISTINCT role                          FROM role_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))))),     super_on_users     AS (SELECT DISTINCT *         FROM (SELECT resource FROM permissions_subject               WHERE name = 'Super'               AND resource_type = 'user'               UNION               SELECT "user" FROM role_users               WHERE role                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'role')               UNION               SELECT "user" FROM group_users               WHERE "group"                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'group'))              AS all_users)SELECT  count(*) AS aggregate_count, date AS aggregate_group_value, CAST (NULL AS TEXT) AS aggregate_subgroup_value, min(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_min_0, max(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_max_0, avg(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) * count(*)   AS aggregate_avg_0, sum(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real))   AS aggregate_sum_0, min(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_min_1, max(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_max_1, avg(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) * count(*)   AS aggregate_avg_1, sum(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real))   AS aggregate_sum_1 FROM reports, (SELECT   0 AS override,   70 AS min_qod)  AS opts WHERE  ((reports.owner   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))  OR EXISTS (SELECT * FROM permissions_subject             WHERE name = 'Super'             AND (resource = 0))  OR reports.owner IN (SELECT *                     FROM super_on_users)  OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.id  AND resource_type = 'report'  AND resource_location = 0  AND (t ())) OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.task  AND resource_type = 'task'  AND (t ()))) AND (SELECT hidden FROM tasks      WHERE tasks.id = task)     = 0   GROUP BY date  )      AS agg_sub GROUP BY outer_group_column, outer_subgroup_column ORDER BY outer_group_column ASC LIMIT ALL OFFSET 0;
openvas    | 2022-02-08 09:02:35.420 GMT [731] ERROR:  canceling statement due to user request
openvas    | 2022-02-08 09:02:35.420 GMT [731] CONTEXT:  SQL function "report_severity_count" statement 1
openvas    | 2022-02-08 09:02:35.420 GMT [731] STATEMENT:  SELECT sum(aggregate_count) AS outer_count, EXTRACT (EPOCH FROM           date_trunc ('day',           TIMESTAMP WITH TIME ZONE 'epoch'           + (aggregate_group_value) * INTERVAL '1 second'))  :: integer AS outer_group_column, aggregate_subgroup_value AS outer_subgroup_column , min(aggregate_min_0), max (aggregate_max_0), sum (aggregate_avg_0) / sum(aggregate_count), sum (aggregate_sum_0), min(aggregate_min_1), max (aggregate_max_1), sum (aggregate_avg_1) / sum(aggregate_count), sum (aggregate_sum_1) FROM (WITH permissions_subject     AS (SELECT * FROM permissions         WHERE subject_location               = 0         AND ((subject_type = 'user'               AND subject                   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))              OR (subject_type = 'group'                  AND subject                      IN (SELECT DISTINCT "group"                          FROM group_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e')))              OR (subject_type = 'role'                  AND subject                      IN (SELECT DISTINCT role                          FROM role_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))))),     super_on_users     AS (SELECT DISTINCT *         FROM (SELECT resource FROM permissions_subject               WHERE name = 'Super'               AND resource_type = 'user'               UNION               SELECT "user" FROM role_users               WHERE role                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'role')               UNION               SELECT "user" FROM group_users               WHERE "group"                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'group'))              AS all_users)SELECT  count(*) AS aggregate_count, date AS aggregate_group_value, CAST (NULL AS TEXT) AS aggregate_subgroup_value, min(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_min_0, max(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_max_0, avg(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) * count(*)   AS aggregate_avg_0, sum(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real))   AS aggregate_sum_0, min(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_min_1, max(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_max_1, avg(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) * count(*)   AS aggregate_avg_1, sum(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real))   AS aggregate_sum_1 FROM reports, (SELECT   0 AS override,   70 AS min_qod)  AS opts WHERE  ((reports.owner   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))  OR EXISTS (SELECT * FROM permissions_subject             WHERE name = 'Super'             AND (resource = 0))  OR reports.owner IN (SELECT *                     FROM super_on_users)  OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.id  AND resource_type = 'report'  AND resource_location = 0  AND (t ())) OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.task  AND resource_type = 'task'  AND (t ()))) AND (SELECT hidden FROM tasks      WHERE tasks.id = task)     = 0   GROUP BY date  )      AS agg_sub GROUP BY outer_group_column, outer_subgroup_column ORDER BY outer_group_column ASC LIMIT ALL OFFSET 0;
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/ospd-openvas.log <==
openvas    | OSPD[621] 2022-02-08 09:02:39,014: INFO: (ospd.ospd) Currently 1 queued scans.
openvas    | OSPD[621] 2022-02-08 09:02:39,292: INFO: (ospd.ospd) Starting scan f18383d8-2edd-4fa2-9f9a-19e71f32475f.
openvas    | 2022-02-08 09:02:58.265 GMT [911] ERROR:  canceling statement due to user request
openvas    | 2022-02-08 09:02:58.265 GMT [911] CONTEXT:  SQL function "report_severity_count" statement 1
openvas    | 2022-02-08 09:02:58.265 GMT [911] STATEMENT:  SELECT sum(aggregate_count) AS outer_count, EXTRACT (EPOCH FROM           date_trunc ('day',           TIMESTAMP WITH TIME ZONE 'epoch'           + (aggregate_group_value) * INTERVAL '1 second'))  :: integer AS outer_group_column, aggregate_subgroup_value AS outer_subgroup_column , min(aggregate_min_0), max (aggregate_max_0), sum (aggregate_avg_0) / sum(aggregate_count), sum (aggregate_sum_0), min(aggregate_min_1), max (aggregate_max_1), sum (aggregate_avg_1) / sum(aggregate_count), sum (aggregate_sum_1) FROM (WITH permissions_subject     AS (SELECT * FROM permissions         WHERE subject_location               = 0         AND ((subject_type = 'user'               AND subject                   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))              OR (subject_type = 'group'                  AND subject                      IN (SELECT DISTINCT "group"                          FROM group_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e')))              OR (subject_type = 'role'                  AND subject                      IN (SELECT DISTINCT role                          FROM role_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))))),     super_on_users     AS (SELECT DISTINCT *         FROM (SELECT resource FROM permissions_subject               WHERE name = 'Super'               AND resource_type = 'user'               UNION               SELECT "user" FROM role_users               WHERE role                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'role')               UNION               SELECT "user" FROM group_users               WHERE "group"                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'group'))              AS all_users)SELECT  count(*) AS aggregate_count, date AS aggregate_group_value, CAST (NULL AS TEXT) AS aggregate_subgroup_value, min(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_min_0, max(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_max_0, avg(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) * count(*)   AS aggregate_avg_0, sum(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real))   AS aggregate_sum_0, min(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_min_1, max(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_max_1, avg(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) * count(*)   AS aggregate_avg_1, sum(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real))   AS aggregate_sum_1 FROM reports, (SELECT   0 AS override,   70 AS min_qod)  AS opts WHERE  ((reports.owner   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))  OR EXISTS (SELECT * FROM permissions_subject             WHERE name = 'Super'             AND (resource = 0))  OR reports.owner IN (SELECT *                     FROM super_on_users)  OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.id  AND resource_type = 'report'  AND resource_location = 0  AND (t ())) OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.task  AND resource_type = 'task'  AND (t ()))) AND (SELECT hidden FROM tasks      WHERE tasks.id = task)     = 0  AND ((((SELECT id FROM tasks     WHERE tasks.uuid = '9007c5a0-8b46-47b8-affa-7a8336f5c295')     = reports.task     OR reports.task IS NULL     OR reports.task = 0)))  GROUP BY date  )      AS agg_sub GROUP BY outer_group_column, outer_subgroup_column ORDER BY outer_group_column ASC LIMIT ALL OFFSET 0;
openvas    | 2022-02-08 09:03:01.798 GMT [922] ERROR:  canceling statement due to user request
openvas    | 2022-02-08 09:03:01.798 GMT [922] CONTEXT:  SQL function "report_severity_count" statement 1
openvas    | 2022-02-08 09:03:01.798 GMT [922] STATEMENT:  SELECT sum(aggregate_count) AS outer_count, EXTRACT (EPOCH FROM           date_trunc ('day',           TIMESTAMP WITH TIME ZONE 'epoch'           + (aggregate_group_value) * INTERVAL '1 second'))  :: integer AS outer_group_column, aggregate_subgroup_value AS outer_subgroup_column , min(aggregate_min_0), max (aggregate_max_0), sum (aggregate_avg_0) / sum(aggregate_count), sum (aggregate_sum_0), min(aggregate_min_1), max (aggregate_max_1), sum (aggregate_avg_1) / sum(aggregate_count), sum (aggregate_sum_1) FROM (WITH permissions_subject     AS (SELECT * FROM permissions         WHERE subject_location               = 0         AND ((subject_type = 'user'               AND subject                   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))              OR (subject_type = 'group'                  AND subject                      IN (SELECT DISTINCT "group"                          FROM group_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e')))              OR (subject_type = 'role'                  AND subject                      IN (SELECT DISTINCT role                          FROM role_users                          WHERE "user"                                = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))))),     super_on_users     AS (SELECT DISTINCT *         FROM (SELECT resource FROM permissions_subject               WHERE name = 'Super'               AND resource_type = 'user'               UNION               SELECT "user" FROM role_users               WHERE role                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'role')               UNION               SELECT "user" FROM group_users               WHERE "group"                     IN (SELECT resource                         FROM permissions_subject                         WHERE name = 'Super'                         AND resource_type = 'group'))              AS all_users)SELECT  count(*) AS aggregate_count, date AS aggregate_group_value, CAST (NULL AS TEXT) AS aggregate_subgroup_value, min(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_min_0, max(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) AS aggregate_max_0, avg(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real)) * count(*)   AS aggregate_avg_0, sum(CAST (report_severity_count (id, opts.override, opts.min_qod, 'High') AS real))   AS aggregate_sum_0, min(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_min_1, max(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) AS aggregate_max_1, avg(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real)) * count(*)   AS aggregate_avg_1, sum(CAST (coalesce (report_severity_count (id, opts.override, opts.min_qod,                                 'High') * 1.0            / nullif (report_result_host_count (id, opts.min_qod), 0),          0) AS real))   AS aggregate_sum_1 FROM reports, (SELECT   0 AS override,   70 AS min_qod)  AS opts WHERE  ((reports.owner   = (SELECT id FROM users WHERE users.uuid = '8282ba3d-66e8-4971-859b-745b76a3a65e'))  OR EXISTS (SELECT * FROM permissions_subject             WHERE name = 'Super'             AND (resource = 0))  OR reports.owner IN (SELECT *                     FROM super_on_users)  OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.id  AND resource_type = 'report'  AND resource_location = 0  AND (t ())) OR EXISTS (SELECT id FROM permissions_subject  WHERE resource = reports.task  AND resource_type = 'task'  AND (t ()))) AND (SELECT hidden FROM tasks      WHERE tasks.id = task)     = 0  AND ((((SELECT id FROM tasks     WHERE tasks.uuid = '9007c5a0-8b46-47b8-affa-7a8336f5c295')     = reports.task     OR reports.task IS NULL     OR reports.task = 0)))  GROUP BY date  )      AS agg_sub GROUP BY outer_group_column, outer_subgroup_column ORDER BY outer_group_column ASC LIMIT ALL OFFSET 0;
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/gvmd.log <==
openvas    | event report:MESSAGE:2022-02-08 09h03.01 UTC:1118: Report 2951f52c-8c93-4085-8d7d-64dbedad230e has been deleted by admin
openvas    | event report:MESSAGE:2022-02-08 09h03.01 UTC:1122: Report dc7913fa-6df5-448f-992f-32eb7d8c3c78 has been deleted by admin
openvas    | 
openvas    | ==> /usr/local/var/log/gvm/openvas.log <==
openvas    | sd   main:MESSAGE:2022-02-08 09h03.06 utc:1150: openvas 21.4.3 started
openvas    | sd   main:WARNING:2022-02-08 09h03.15 utc:1150: Couldn't resolve hostname 'sub.domain.org'
openvas    | sd   main:WARNING:2022-02-08 09h03.15 utc:1150: Couldn't resolve hostname 'sub.domain.org'
openvas    | sd   main:WARNING:2022-02-08 09h03.15 utc:1150: Couldn't resolve hostname 'isub.domain.org'
openvas    | sd   main:WARNING:2022-02-08 09h03.15 utc:1150: Couldn't resolve hostname 'sub.domain.org'
openvas    | sd   main:MESSAGE:2022-02-08 09h03.15 utc:1150: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started: Target has 420 hosts: IPs and Hosts, with max_hosts = 30 and max_checks = 5
openvas    | libgvm boreas:MESSAGE:2022-02-08 09h03.15 utc:1150: Alive scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started: Target has 420 hosts
openvas    | libgvm boreas:MESSAGE:2022-02-08 09h03.15 utc:1150: Alive scan f18383d8-2edd-4fa2-9f9a-19e71f32475f finished in 0 seconds: 420 alive hosts of 420.
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1153: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1154: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1160: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1155: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1156: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1162: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1163: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1161: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1165: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1168: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1164: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1169: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1159: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS (Vhosts: sub.domain.org, domain.org, domain.org)
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1157: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1192: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1158: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1227: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1230: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1240: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1211: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1249: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1260: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1292: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1324: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1331: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1337: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1352: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1351: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1353: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS
openvas    | sd   main:MESSAGE:2022-02-08 09h03.16 utc:1388: Vulnerability scan f18383d8-2edd-4fa2-9f9a-19e71f32475f started for host: IP-ADDRESS

IPs Hosts and Names where removed from the logs and replaced with placeholders.

DRIgnazGortngschirl commented 2 years ago

I feel stupid, but for all other which also face this issue.

Stop the container, remove all volumes and images and start it again, this should solve it.

In my case with docker compose

docker-compose stop
docker-compose rm
docker system prune