. [ 18.821944] systemd[1]: Created slice user.slice. [ OK ] Created slice user.slice. [ 18.824141] systemd[1]: Started systemd-ask-password-console.path. [ OK ] Started systemd-ask-password-console.path. [ 18.827661] systemd[1]: Started systemd-ask-password-wall.path. [ OK ] Started systemd-ask-password-wall.path. [ 18.831385] systemd[1]: Set up automount boot.automount. [ OK ] Set up automount boot.automount. [ 18.834465] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. [ OK ] Set up automount proc-sys-fs-binfmt_misc.automount. [ 18.837505] systemd[1]: Stopped target initrd-switch-root.target. [ OK ] Stopped target initrd-switch-root.target. [ 18.840199] systemd[1]: Stopped target initrd-fs.target. [ OK ] Stopped target initrd-fs.target. [ 18.842566] systemd[1]: Stopped target initrd-root-fs.target. [ OK ] Stopped target initrd-root-fs.target. [ 18.845802] systemd[1]: Reached target integritysetup.target. [ OK ] Reached target integritysetup.target. [ 18.850219] systemd[1]: Reached target remote-cryptsetup.target. [ OK ] Reached target remote-cryptsetup.target. [ 18.853297] systemd[1]: Reached target remote-fs.target. [ OK ] Reached target remote-fs.target. [ 18.856032] systemd[1]: Reached target slices.target. [ OK ] Reached target slices.target. [ 18.859026] systemd[1]: Reached target swap.target. [ OK ] Reached target swap.target. [ 18.861661] systemd[1]: Reached target torcx.target. [ OK ] Reached target torcx.target. [ 18.864108] systemd[1]: Reached target veritysetup.target. [ OK ] Reached target veritysetup.target. [ 18.868673] systemd[1]: Listening on systemd-coredump.socket. [ OK ] Listening on systemd-coredump.socket. [ 18.871502] systemd[1]: Listening on systemd-initctl.socket. [ OK ] Listening on systemd-initctl.socket. [ 18.874496] systemd[1]: Listening on systemd-networkd.socket. [ OK ] Listening on systemd-networkd.socket. [ 18.877642] systemd[1]: Listening on systemd-udevd-control.socket. [ OK ] Listening on systemd-udevd-control.socket. [ 18.881602] systemd[1]: Listening on systemd-udevd-kernel.socket. [ OK ] Listening on systemd-udevd-kernel.socket. [ 18.885982] systemd[1]: Listening on systemd-userdbd.socket. [ OK ] Listening on systemd-userdbd.socket. [ 18.891286] systemd[1]: Mounting dev-hugepages.mount... Mounting dev-hugepages.mount... [ 18.896354] systemd[1]: Mounting dev-mqueue.mount... Mounting dev-mqueue.mount... [ 18.900219] systemd[1]: Mounting media.mount... Mounting media.mount... [ 18.903095] systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). [ 18.921814] systemd[1]: Mounting sys-kernel-debug.mount... Mounting sys-kernel-debug.mount... [ 18.934415] systemd[1]: Mounting sys-kernel-tracing.mount... Mounting sys-kernel-tracing.mount... [ 18.943019] systemd[1]: Mounting tmp.mount... Mounting tmp.mount... [ 18.954448] systemd[1]: Starting flatcar-tmpfiles.service... Starting flatcar-tmpfiles.service... [ 18.960843] systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. [ 18.967678] systemd[1]: Starting kmod-static-nodes.service... Starting kmod-static-nodes.service... [ 18.972478] systemd[1]: Starting modprobe@configfs.service... Starting modprobe@configfs.service... [ 18.977930] systemd[1]: Starting modprobe@dm_mod.service... Starting modprobe@dm_mod.service... [ 18.983949] systemd[1]: Starting modprobe@drm.service... Starting modprobe@drm.service... [ 18.988425] systemd[1]: Starting modprobe@efi_pstore.service... Starting modprobe@efi_pstore.service... [ 18.993018] systemd[1]: Starting modprobe@fuse.service... Starting modprobe@fuse.service... [ 19.004632] systemd[1]: Starting modprobe@loop.service... Starting modprobe@loop.service... [ 19.008911] systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). [ 19.012750] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [ 19.015348] systemd[1]: Stopped systemd-fsck-root.service. [ OK ] Stopped systemd-fsck-root.service. [ 19.018993] systemd[1]: systemd-fsck-usr.service: Deactivated successfully. [ 19.021135] systemd[1]: Stopped systemd-fsck-usr.service. [ OK ] Stopped systemd-fsck-usr.service. [ 19.025012] systemd[1]: Stopped systemd-journald.service. [ OK ] Stopped systemd-journald.service. [ 19.034385] systemd[1]: Starting systemd-journald.service... Starting systemd-journald.service... [ 19.040186] systemd[1]: Starting systemd-modules-load.service... Starting systemd-modules-load.service... [ 19.046237] systemd[1]: Starting systemd-network-generator.service... Starting systemd-network-generator.service... [ 19.049766] loop: module loaded [ 19.051486] fuse: init (API version 7.34) [ 19.052964] systemd[1]: Starting systemd-remount-fs.service... Starting systemd-remount-fs.service... [ 19.065928] systemd[1]: Starting systemd-udev-trigger.service... Starting systemd-udev-trigger.service... [ 19.068852] systemd[1]: verity-setup.service: Deactivated successfully. [ 19.070278] systemd[1]: Stopped verity-setup.service. [ OK ] Stopped verity-setup.service. [ 19.072627] systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). [ 19.079307] systemd[1]: Mounted dev-hugepages.mount. [ OK ] Mounted dev-hugepages.mount. [ 19.082112] systemd[1]: Mounted dev-mqueue.mount. [ OK ] Mounted dev-mqueue.mount. [ 19.084632] systemd[1]: Mounted media.mount. [ OK ] Mounted media.mount. [ 19.086938] systemd[1]: Mounted sys-kernel-debug.mount. [ OK ] Mounted sys-kernel-debug.mount. [ 19.089612] systemd[1]: Mounted sys-kernel-tracing.mount. [ OK ] Mounted sys-kernel-tracing.mount. [ 19.092899] systemd[1]: Mounted tmp.mount. [ OK ] Mounted tmp.mount. [ 19.095015] systemd[1]: Finished kmod-static-nodes.service. [ OK ] Finished kmod-static-nodes.service. [ 19.098148] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 19.099886] systemd[1]: Finished modprobe@configfs.service. [ OK ] Finished modprobe@configfs.service. [ 19.105864] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 19.110558] systemd[1]: Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@dm_mod.service. [ 19.113751] systemd[1]: modprobe@drm.service: Deactivated successfully. [ 19.115899] systemd[1]: Finished modprobe@drm.service. [ OK ] Finished modprobe@drm.service. [ 19.119081] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. [ 19.121267] systemd[1]: Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@efi_pstore.service. [ 19.125611] systemd[1]: Started systemd-journald.service. [ OK ] Started systemd-journald.service. [ OK ] Finished modprobe@fuse.service. [ OK ] Finished modprobe@loop.service. [ OK ] Finished systemd-modules-load.service. [ OK ] Finished systemd-network-generator.service. [ OK ] Finished systemd-remount-fs.service. [ OK ] Reached target network-pre.target. Mounting sys-fs-fuse-connections.mount... Mounting sys-kernel-config.mount... Starting systemd-hwdb-update.service... Starting systemd-journal-flush.service... Starting systemd-random-seed.service... Starting systemd-sysctl.service... [ OK ] Mounted sys-fs-fuse-connections.mount. [ OK ] Mounted sys-kernel-config.mount. [ 19.183102] systemd-journald[1398]: Received client request to flush runtime journal. [ OK ] Finished systemd-random-seed.service. [ OK ] Reached target first-boot-complete.target. [ OK ] Finished systemd-sysctl.service. [ OK ] Finished systemd-udev-trigger.service. [ OK ] Finished systemd-journal-flush.service. Starting systemd-udev-settle.service... [ OK ] Finished flatcar-tmpfiles.service. Starting systemd-sysusers.service... [ OK ] Finished systemd-sysusers.service. [ OK ] Finished systemd-hwdb-update.service. Starting systemd-udevd.service... [ OK ] Started systemd-udevd.service. Starting systemd-networkd.service... Starting systemd-userdbd.service... [ OK ] Started systemd-userdbd.service. [ 20.273461] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 [ 20.291479] ACPI: button: Power Button [PWRF] [ 20.303050] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 [ 20.319780] ACPI: button: Sleep Button [SLPF] [ OK ] Started systemd-networkd.service. [ 20.338197] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Starting systemd-networkd-wait-online.service... [ 20.403937] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 [ 20.425083] input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 [ 20.450467] BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1450) [ 20.474058] mousedev: PS/2 mouse device common for all mice [ OK ] Found device dev-disk-by\x2dlabel-OEM.device. [ OK ] Finished systemd-udev-settle.service. Starting lvm2-activation-early.service... [ OK ] Finished lvm2-activation-early.service. [ OK ] Reached target cryptsetup.target. Starting lvm2-activation.service... [ OK ] Finished lvm2-activation.service. [ OK ] Reached target local-fs-pre.target. [ OK ] Reached target local-fs.target. [ OK ] Reached target machines.target. Starting ldconfig.service... Starting systemd-boot-update.service... Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Starting systemd-machine-id-commit.service... Starting systemd-tmpfiles-setup.service... Starting systemd-fsck@dev-…label-EFI\x2dSYSTEM.service... [ OK ] Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. [ OK ] Finished systemd-fsck@dev-…2dlabel-EFI\x2dSYSTEM.service. Mounting boot.mount... [ OK ] Mounted boot.mount. [ OK ] Finished systemd-boot-update.service. [ OK ] Finished systemd-tmpfiles-setup.service. Starting audit-rules.service... Starting clean-ca-certificates.service... Starting systemd-journal-catalog-update.service... Starting systemd-resolved.service... Starting systemd-timesyncd.service... Starting systemd-update-utmp.service... [ OK ] Finished systemd-update-utmp.service. [ OK ] Finished clean-ca-certificates.service. [ OK ] Finished systemd-journal-catalog-update.service. [ OK ] Finished audit-rules.service. [ OK ] Started systemd-timesyncd.service. [ OK ] Reached target time-set.target. [ OK ] Started systemd-resolved.service. [ OK ] Reached target network.target. [ OK ] Reached target nss-lookup.target. [ OK ] Finished systemd-machine-id-commit.service. [ OK ] Finished systemd-networkd-wait-online.service. [ OK ] Reached target network-online.target. [ OK ] Finished ldconfig.service. Starting systemd-update-done.service... [ OK ] Finished systemd-update-done.service. [ OK ] Reached target sysinit.target. [ OK ] Started motdgen.path. [ OK ] Started user-cloudinit@var…car\x2dinstall-user_data.path. [ OK ] Started logrotate.timer. [ OK ] Started mdadm.timer. [ OK ] Started systemd-tmpfiles-clean.timer. [ OK ] Reached target paths.target. [ OK ] Reached target timers.target. [ OK ] Listening on dbus.socket. Starting docker.socket... [ OK ] Listening on sshd.socket. [ OK ] Listening on docker.socket. [ OK ] Reached target sockets.target. [ OK ] Reached target basic.target. [ OK ] Started amazon-ssm-agent.service. Starting containerd.service... Starting coreos-metadata-sshkeys@core.service... Starting dbus.service... Starting enable-oem-cloudinit.service... Starting extend-filesystems.service... Starting motdgen.service... [ OK ] Started nvidia.service. Starting prepare-cni-plugins.service... Starting prepare-critools.service... Starting ssh-key-proc-cmdline.service... Starting sshd-keygen.service... Starting systemd-logind.service... Starting update-engine.service... Starting update-ssh-keys-after-ignition.service... [ OK ] Finished ssh-key-proc-cmdline.service. [ 22.255398] extend-filesystems[1619]: Found nvme0n1 [ 22.256804] extend-filesystems[1619]: Found nvme0n1p1 [ 22.257902] extend-filesystems[1619]: Found nvme0n1p2 [ 22.261731] extend-filesystems[1619]: Found nvme0n1p3 [ 22.265295] extend-filesystems[1619]: Found usr [ 22.266403] extend-filesystems[1619]: Found nvme0n1p4 [ OK ] Started dbus.service. [ 22.271993] extend-filesystems[1619]: Found nvme0n1p6 [ 22.274128] extend-filesystems[1619]: Found nvme0n1p7 [ OK ] Reached target system-config.target. [ OK ] Reached target user-config.target. [ 22.277926] extend-filesystems[1619]: Found nvme0n1p9 [ 22.279366] extend-filesystems[1619]: Checking size of /dev/nvme0n1p9 [ OK ] Finished motdgen.service. Starting systemd-hostnamed.service... [ 22.398200] extend-filesystems[1619]: Resized partition /dev/nvme0n1p9 [ 22.408664] extend-filesystems[1679]: resize2[ 22.799235] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks fs 1.46.5 (30-Dec-2021) [ 22.880126] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 [ OK ] Finished extend-filesystems.service. [ 22.524732] extend-filesystems[1679]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required [ 22.528518] extend-filesystems[1679]: old_desc_blocks = 1, new_desc_blocks = 1 [ OK ] Started update-engine.service. [ 22.529909] extend-filesystems[1679]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. [ 22.533264] extend-filesystems[1619]: Resized filesystem in /dev/nvme0n1p9 [ OK ] Started locksmithd.service. [ OK ] Finished update-ssh-keys-after-ignition.service. [ OK ] Started systemd-logind.service. [ OK ] Started systemd-hostnamed.service. [ OK ] Started containerd.service. Starting polkit.service... [ OK ] Started polkit.service. [ OK ] Finished coreos-metadata-sshkeys@core.service. [ OK ] Finished prepare-critools.service. [ OK ] Finished prepare-cni-plugins.service. [ OK ] Finished sshd-keygen.service. Starting issuegen.service... [ OK ] Finished issuegen.service. Starting systemd-user-sessions.service... [ OK ] Finished systemd-user-sessions.service. [ OK ] Started getty@tty1.service. [ OK ] Started serial-getty@ttyS0.service. [ OK ] Reached target getty.target. [ OK ] Reached target multi-user.target. Starting systemd-update-utmp-runlevel.service... [ OK ] Finished systemd-update-utmp-runlevel.service. This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:16:29 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: [ 33.410184] kauditd_printk_skb: 176 callbacks suppressed [ 33.410188] audit: type=1305 audit(1696274196.886:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 33.415208] audit: type=1300 audit(1696274196.886:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff41ca8ce0 a2=420 a3=0 items=0 ppid=1 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 33.425082] audit: type=1327 audit(1696274196.886:157): proctitle=2F7362696E2F617564697463746C002D44 [ 33.428264] audit: type=1131 audit(1696274196.891:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 33.447771] audit: type=1130 audit(1696274196.923:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 33.453222] audit: type=1106 audit(1696274196.924:160): pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 33.458857] audit: type=1104 audit(1696274196.924:161): pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 33.473360] audit: type=1106 audit(1696274196.949:162): pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 33.482175] audit: type=1104 audit(1696274196.949:163): pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 33.488177] audit: type=1131 audit(1696274196.952:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.212:22-139.178.89.65:48322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 34.708715] Initializing XFRM netlink socket This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:16:39 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: [ 45.666617] kauditd_printk_skb: 292 callbacks suppressed [ 45.666620] audit: type=1130 audit(1696274209.139:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 45.674751] audit: type=1131 audit(1696274209.139:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 45.680572] audit: type=1130 audit(1696274209.144:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 45.840295] audit: type=1131 audit(1696274209.316:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 53.265149] audit: type=1131 audit(1696274216.740:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 53.286796] audit: type=1334 audit(1696274216.763:412): prog-id=48 op=UNLOAD [ 53.289493] audit: type=1334 audit(1696274216.763:413): prog-id=47 op=UNLOAD [ 53.291600] audit: type=1334 audit(1696274216.763:414): prog-id=46 op=UNLOAD [ 55.913770] audit: type=1130 audit(1696274219.390:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 55.925005] audit: type=1131 audit(1696274219.390:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 55.933354] audit: type=1130 audit(1696274219.396:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 56.069488] audit: type=1131 audit(1696274219.546:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 62.202879] audit: type=1130 audit(1696274225.680:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 62.208581] audit: type=1131 audit(1696274225.680:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 62.544479] audit: type=1400 audit(1696274226.023:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.549742] audit: type=1400 audit(1696274226.023:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.554273] audit: type=1400 audit(1696274226.023:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.559386] audit: type=1400 audit(1696274226.023:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.564847] audit: type=1400 audit(1696274226.023:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.569835] audit: type=1400 audit(1696274226.023:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.575009] audit: type=1400 audit(1696274226.023:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 62.576461] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.295024] kauditd_printk_skb: 557 callbacks suppressed [ 67.295027] audit: type=1400 audit(1696274230.775:716): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 67.305236] audit: type=1300 audit(1696274230.775:716): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001080000 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) [ 67.323076] audit: type=1327 audit(1696274230.775:716): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 67.332645] audit: type=1400 audit(1696274230.785:717): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 67.341388] audit: type=1300 audit(1696274230.785:717): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00106e040 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) [ 67.349578] audit: type=1327 audit(1696274230.785:717): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 68.725119] audit: type=1400 audit(1696274232.204:718): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 68.734347] audit: type=1300 audit(1696274232.204:718): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003c6e270 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) [ 68.752883] audit: type=1327 audit(1696274232.204:718): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 68.766998] audit: type=1400 audit(1696274232.212:719): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 72.349933] kauditd_printk_skb: 14 callbacks suppressed [ 72.349936] audit: type=1400 audit(1696274235.830:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 72.357098] audit: type=1400 audit(1696274235.830:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 72.370603] audit: type=1400 audit(1696274235.830:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 72.377212] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.378703] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 72.382940] audit: type=1400 audit(1696274235.830:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 72.383344] audit: backlog limit exceeded [ 72.391354] audit: type=1400 audit(1696274235.830:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 72.398587] audit: type=1400 audit(1696274235.830:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 72.403165] audit: type=1400 audit(1696274235.830:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 79.643484] kauditd_printk_skb: 250 callbacks suppressed [ 79.643487] audit: type=1106 audit(1696274243.125:972): pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 79.652342] audit: type=1104 audit(1696274243.132:973): pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 79.697937] audit: type=1106 audit(1696274243.176:974): pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 79.705394] audit: type=1104 audit(1696274243.176:975): pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 79.713331] audit: type=1131 audit(1696274243.194:976): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.212:22-139.178.89.65:48338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 82.318589] audit: type=1400 audit(1696274245.800:977): avc: denied { watch } for pid=2525 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 [ 82.325218] audit: type=1300 audit(1696274245.800:977): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dc2400 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) [ 82.332945] audit: type=1327 audit(1696274245.800:977): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 82.381295] audit: type=1400 audit(1696274245.863:978): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 82.391136] audit: type=1300 audit(1696274245.863:978): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8480 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) [ 86.755356] kauditd_printk_skb: 10 callbacks suppressed [ 86.755359] audit: type=1400 audit(1696274250.237:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.763380] audit: type=1400 audit(1696274250.237:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.773856] audit: type=1400 audit(1696274250.237:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.780956] audit: type=1400 audit(1696274250.237:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.789383] audit: type=1400 audit(1696274250.237:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.795480] audit: type=1400 audit(1696274250.237:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.805490] audit: type=1400 audit(1696274250.237:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.810486] audit: type=1400 audit(1696274250.237:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.817957] audit: type=1400 audit(1696274250.237:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.823232] audit: type=1400 audit(1696274250.237:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.021097] kauditd_printk_skb: 357 callbacks suppressed [ 92.021100] audit: type=1325 audit(1696274255.503:1093): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 92.026577] audit: type=1300 audit(1696274255.503:1093): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe652c93a0 a2=0 a3=7ffe652c938c items=0 ppid=3006 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 92.036933] audit: type=1327 audit(1696274255.503:1093): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 92.040853] audit: type=1325 audit(1696274255.503:1094): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 92.046345] audit: type=1300 audit(1696274255.503:1094): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe652c93a0 a2=0 a3=31030 items=0 ppid=3006 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 92.059406] audit: type=1327 audit(1696274255.503:1094): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 92.064158] audit: type=1325 audit(1696274255.541:1095): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 92.067679] audit: type=1300 audit(1696274255.541:1095): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff9e6a87a0 a2=0 a3=7fff9e6a878c items=0 ppid=3006 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 92.075117] audit: type=1327 audit(1696274255.541:1095): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 92.079660] audit: type=1325 audit(1696274255.545:1096): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 97.036516] kauditd_printk_skb: 182 callbacks suppressed [ 97.036519] audit: type=1325 audit(1696274260.504:1154): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 97.045979] audit: type=1300 audit(1696274260.504:1154): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc6d076ce0 a2=0 a3=7ffc6d076ccc items=0 ppid=3006 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 97.055654] audit: type=1327 audit(1696274260.504:1154): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 98.168556] audit: type=1400 audit(1696274261.651:1155): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 98.173631] audit: type=1300 audit(1696274261.651:1155): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3245 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 98.189643] audit: type=1327 audit(1696274261.651:1155): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338336537623665383032643333653862643764373237303036633038 [ 98.199269] audit: type=1400 audit(1696274261.651:1156): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 98.206958] audit: type=1400 audit(1696274261.651:1156): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 98.212884] audit: type=1400 audit(1696274261.651:1156): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 98.224038] audit: type=1400 audit(1696274261.651:1156): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.491196] kauditd_printk_skb: 37 callbacks suppressed [ 104.491229] audit: type=1400 audit(1696274267.973:1162): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.498301] audit: type=1300 audit(1696274267.973:1162): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3245 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 104.506086] audit: type=1327 audit(1696274267.973:1162): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661646637643061313732393664633833306138623335623633626335 [ 104.512763] audit: type=1400 audit(1696274267.973:1163): avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.517239] audit: type=1400 audit(1696274267.973:1163): avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.526085] audit: type=1400 audit(1696274267.973:1163): avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.532975] audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.539772] audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.545062] audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.552231] audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.195539] kauditd_printk_skb: 34 callbacks suppressed [ 112.195542] audit: type=1400 audit(1696274275.678:1169): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.201563] audit: type=1300 audit(1696274275.678:1169): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3245 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 112.209979] audit: type=1327 audit(1696274275.678:1169): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633833373762386161306337666636363830396133363164646132 [ 112.217475] audit: type=1400 audit(1696274275.678:1170): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.223436] audit: type=1400 audit(1696274275.678:1170): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.230529] audit: type=1400 audit(1696274275.678:1170): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.236153] audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.243245] audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.248341] audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.253966] audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 112.358474] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 112.360281] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:18:00 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:18:01 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: [ 120.355616] IPv6: ADDRCONF(NETDEV_CHANGE): calieaecfddfdef: link becomes ready [ 120.357190] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 120.507068] kauditd_printk_skb: 151 callbacks suppressed [ 120.507071] audit: type=1325 audit(1696274283.987:1200): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 120.513203] audit: type=1300 audit(1696274283.987:1200): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd3bb9c0a0 a2=0 a3=7ffd3bb9c08c items=0 ppid=3847 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 120.520282] audit: type=1327 audit(1696274283.987:1200): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 120.524406] audit: type=1400 audit(1696274283.994:1201): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.529865] audit: type=1400 audit(1696274283.994:1202): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.545341] audit: type=1400 audit(1696274283.994:1203): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.550057] audit: type=1400 audit(1696274283.994:1204): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.555096] audit: type=1400 audit(1696274283.994:1205): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.559641] audit: type=1400 audit(1696274283.994:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.564591] audit: type=1400 audit(1696274283.994:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.673248] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 122.674868] IPv6: ADDRCONF(NETDEV_CHANGE): calice1afb656fe: link becomes ready This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:18:06 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: [ 122.953026] IPv6: ADDRCONF(NETDEV_CHANGE): cali29e4e0ce570: link becomes ready [ 123.256451] IPv6: ADDRCONF(NETDEV_CHANGE): cali4ab44580a21: link becomes ready This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:18:08 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:18:09 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: [ 126.352529] kauditd_printk_skb: 416 callbacks suppressed [ 126.352532] audit: type=1325 audit(1696274289.833:1335): table=filter:110 family=2 entries=8 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 126.358990] audit: type=1300 audit(1696274289.833:1335): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff69a95560 a2=0 a3=7fff69a9554c items=0 ppid=3006 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 126.370232] audit: type=1327 audit(1696274289.833:1335): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 126.374459] audit: type=1325 audit(1696274289.850:1336): table=nat:111 family=2 entries=20 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 126.380122] audit: type=1300 audit(1696274289.850:1336): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff69a95560 a2=0 a3=7fff69a9554c items=0 ppid=3006 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 126.389256] audit: type=1327 audit(1696274289.850:1336): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 127.305299] audit: type=1400 audit(1696274290.785:1337): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 127.311827] audit: type=1300 audit(1696274290.785:1337): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00218a5a0 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) [ 127.320273] audit: type=1327 audit(1696274290.785:1337): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 127.327647] audit: type=1400 audit(1696274290.801:1338): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 141.190791] kauditd_printk_skb: 31 callbacks suppressed [ 141.190793] audit: type=1130 audit(1696274304.668:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.212:22-139.178.89.65:58330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 141.377366] audit: type=1101 audit(1696274304.855:1355): pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.389581] audit: type=1103 audit(1696274304.866:1356): pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.397100] audit: type=1006 audit(1696274304.866:1357): pid=4957 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 [ 141.403086] audit: type=1300 audit(1696274304.866:1357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd0875960 a2=3 a3=0 items=0 ppid=1 pid=4957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 141.410997] audit: type=1327 audit(1696274304.866:1357): proctitle=737368643A20636F7265205B707269765D [ 141.417406] audit: type=1105 audit(1696274304.895:1358): pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.427524] audit: type=1103 audit(1696274304.903:1359): pid=4959 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.681364] audit: type=1106 audit(1696274305.159:1360): pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 141.690273] audit: type=1104 audit(1696274305.167:1361): pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 151.673293] kauditd_printk_skb: 13 callbacks suppressed [ 151.673296] audit: type=1130 audit(1696274315.149:1367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.212:22-139.178.89.65:36414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 151.836241] audit: type=1101 audit(1696274315.312:1368): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 151.844153] audit: type=1103 audit(1696274315.320:1369): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 151.858019] audit: type=1006 audit(1696274315.320:1370): pid=5051 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 [ 151.867462] audit: type=1300 audit(1696274315.320:1370): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92b533d0 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 151.877009] audit: type=1327 audit(1696274315.320:1370): proctitle=737368643A20636F7265205B707269765D [ 151.885096] audit: type=1105 audit(1696274315.354:1371): pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 151.893304] audit: type=1103 audit(1696274315.358:1372): pid=5053 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.161925] audit: type=1106 audit(1696274315.638:1373): pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 152.169377] audit: type=1104 audit(1696274315.639:1374): pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 164.894759] kauditd_printk_skb: 23 callbacks suppressed [ 164.894762] audit: type=1130 audit(1696274328.369:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.212:22-139.178.89.65:58160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 165.095141] audit: type=1101 audit(1696274328.569:1395): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.102583] audit: type=1103 audit(1696274328.576:1396): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.109961] audit: type=1006 audit(1696274328.576:1397): pid=5174 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 [ 165.114111] audit: type=1300 audit(1696274328.576:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda91b2a50 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 165.122096] audit: type=1327 audit(1696274328.576:1397): proctitle=737368643A20636F7265205B707269765D [ 165.130719] audit: type=1105 audit(1696274328.605:1398): pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.137903] audit: type=1103 audit(1696274328.610:1399): pid=5176 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.354791] audit: type=1106 audit(1696274328.829:1400): pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 165.370269] audit: type=1104 audit(1696274328.829:1401): pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 168.301110] IPv6: ADDRCONF(NETDEV_CHANGE): cali05b4def5a6d: link becomes ready This is ip-172-31-27-212 (Linux x86_64 5.15.132-flatcar) 19:18:54 SSH host key: SHA256:Om3n9pAb/YMDCulJ/DP6g1w4elh8rk6SD/5/se6lFmQ (RSA) SSH host key: SHA256:dksxerMkwW4St6Kgaqk5GuFZmueW0z1wJKDzYRgQeqM (ECDSA) SSH host key: SHA256:x6dQhsZlEv2AhRxpcS9xwFhs+mdVuvzunlBYaZH0OWA (ED25519) eth0: 172.31.27.212 fe80::4b1:1eff:fe3b:72d9 ip-172-31-27-212 login: [ 187.314331] kauditd_printk_skb: 79 callbacks suppressed [ 187.314334] audit: type=1400 audit(1696274350.787:1428): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 187.323658] audit: type=1300 audit(1696274350.787:1428): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002093f80 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) [ 187.331989] audit: type=1327 audit(1696274350.787:1428): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 187.339102] audit: type=1400 audit(1696274350.802:1429): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 187.344565] audit: type=1300 audit(1696274350.802:1429): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015fd720 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) [ 187.351626] audit: type=1327 audit(1696274350.802:1429): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 188.745932] audit: type=1400 audit(1696274352.218:1430): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 188.751891] audit: type=1300 audit(1696274352.218:1430): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0082906c0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) [ 188.759478] audit: type=1327 audit(1696274352.218:1430): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 188.765830] audit: type=1400 audit(1696274352.218:1431): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 199.985019] kauditd_printk_skb: 14 callbacks suppressed [ 199.985023] audit: type=1334 audit(1696274363.456:1436): prog-id=123 op=UNLOAD [ 199.994260] audit: type=1334 audit(1696274363.464:1437): prog-id=126 op=UNLOAD [ 200.376826] audit: type=1400 audit(1696274363.848:1438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 200.381351] audit: type=1400 audit(1696274363.848:1439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 200.385847] audit: type=1400 audit(1696274363.848:1440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 200.390382] audit: type=1400 audit(1696274363.848:1441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 200.394797] audit: type=1400 audit(1696274363.848:1442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 200.400023] audit: type=1400 audit(1696274363.848:1443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 200.404628] audit: type=1400 audit(1696274363.848:1444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 200.411242] audit: type=1400 audit(1696274363.848:1445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 206.229877] kauditd_printk_skb: 114 callbacks suppressed [ 206.229880] audit: type=1334 audit(1696274369.701:1478): prog-id=86 op=UNLOAD [ 206.236284] audit: type=1334 audit(1696274369.701:1479): prog-id=94 op=UNLOAD [ 207.451810] audit: type=1400 audit(1696274370.923:1480): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 207.458380] audit: type=1400 audit(1696274370.923:1481): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 207.464227] audit: type=1400 audit(1696274370.923:1482): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 207.470784] audit: type=1400 audit(1696274370.923:1483): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 207.476135] audit: type=1400 audit(1696274370.923:1484): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 207.481291] audit: type=1400 audit(1696274370.923:1485): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 207.486397] audit: type=1400 audit(1696274370.923:1486): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 207.490999] audit: type=1400 audit(1696274370.923:1487): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0